SYT-2023-6: Relative path transversal vulnerability in Secure Integration Server

Publisher: Softing Industrial Automation GmbH Document category: csaf_security_advisory
Initial release date: 2023-11-30T07:16:29.738Z Engine: Secvisogram .2.2.15
Current release date: 2023-11-30T07:16:29.738Z Build Date: 2023-11-30T07:19:58.031Z
Current version: 1.0.0 Status: final
CVSSv3.1 Base Score: 7.2 Severity: high
Original language: en-US Language:
Also referred to:

Vulnerabilities

(CVE-2023-39481)

A path transversal vulnerability allows to write arbitrary files using the /runtime/uacore/nodesetxml URI.

CWE: CWE-23:Relative Path Traversal

Product status

Known affected
Product CVSS-Vector CVSS Base Score
Softing Secure Integration Server <= V1.22 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 7.2
Fixed

Acknowledgments

Softing Industrial Automation GmbH

Namespace: https://industrial.softing.com

Softing PSIRT - contact us at [email protected]

Revision history

Version Date of the revision Summary of the revision
1.0.0 2023-11-30T07:16:29.738Z Initial version

Disclaimer

The information provided in this disclosure is provided "as is" without warranty of any kind. Softing disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Softing or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Softing or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.