FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/168116/FLIR-AX8-1.46.16-Traversal-Access-Control-Command-Injection-XSS.html | Exploit Third Party Advisory VDB Entry |
https://gist.github.com/Nwqda/9e16852ab7827dc62b8e44d6180a6899 | Exploit Mitigation Third Party Advisory |
https://www.flir.com/products/ax8-automation/ | Product Vendor Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5493.php | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-08-18 17:15
Updated : 2022-12-12 21:11
NVD link : CVE-2022-37060
Mitre link : CVE-2022-37060
CVE.ORG link : CVE-2022-37060
JSON object : View
Products Affected
flir
- flir_ax8_firmware
- flir_ax8
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')