In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2023-003/ | Not Applicable |
https://github.com/advisories/GHSA-w923-8w64-f5gh | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2023-04-17 08:15
Updated : 2023-04-26 23:00
NVD link : CVE-2023-1109
Mitre link : CVE-2023-1109
CVE.ORG link : CVE-2023-1109
JSON object : View
Products Affected
phoenixcontact
- smartrtu_axc_sg_firmware
- infobox_firmware
- smartrtu_axc_sg
- infobox
- smartrtu_axc_ig_firmware
- energy_axc_pu
- smartrtu_axc_ig
CWE
NVD-CWE-noinfo
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')