The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Myscada
Myscada mypro Manager Myscada mypro Runtime |
|
CPEs | cpe:2.3:a:myscada:mypro_manager:*:*:*:*:*:*:*:* cpe:2.3:a:myscada:mypro_runtime:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Myscada
Myscada mypro Manager Myscada mypro Runtime |
|
Metrics |
ssvc
|
Fri, 22 Nov 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The back-end does not sufficiently verify the user-controlled filename parameter which makes it possible for an attacker to perform a path traversal attack and retrieve arbitrary files from the file system. | |
Title | mySCADA myPRO Path Traversal | |
Weaknesses | CWE-35 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-11-22T22:22:08.207Z
Updated: 2024-11-26T16:59:05.931Z
Reserved: 2024-11-13T20:44:28.734Z
Link: CVE-2024-50054
Vulnrichment
Updated: 2024-11-26T16:58:45.535Z
NVD
Status : Received
Published: 2024-11-22T23:15:05.510
Modified: 2024-11-22T23:15:05.510
Link: CVE-2024-50054
Redhat
No data.