mySCADA myPRO Path Traversal
CVE-2024-50054
7.5HIGH
Summary
A vulnerability exists in XYZ Software from ExampleCorp due to inadequate validation of user-controlled filename parameters. This flaw can be exploited by an attacker to launch a path traversal attack, gaining unauthorized access to sensitive files on the system. By manipulating the input, the attacker may retrieve arbitrary files from the file system, potentially compromising confidentiality and integrity. Organizations using affected versions of XYZ Software should implement security best practices and monitor for suspicious activities to mitigate the risk associated with this vulnerability.
Affected Version(s)
myPRO Manager 0 < 1.3
myPRO Runtime 0 < 9.2.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
Michael Heinzl reported these vulnerabilities to CISA.