10
CVE-2012-4705
- EPSS 70.39%
- Published 24.02.2013 11:48:21
- Last modified 11.04.2025 00:51:21
- Source ics-cert@hq.dhs.gov
- Teams watchlist Login
- Open Login
Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname.
Data is provided by the National Vulnerability Database (NVD)
3s-software ≫ Codesys Gateway-server Version <= 2.3.9.20
3s-software ≫ Codesys Gateway-server Version2.3.5.1
3s-software ≫ Codesys Gateway-server Version2.3.5.2
3s-software ≫ Codesys Gateway-server Version2.3.5.3
3s-software ≫ Codesys Gateway-server Version2.3.6.0
3s-software ≫ Codesys Gateway-server Version2.3.7.0
3s-software ≫ Codesys Gateway-server Version2.3.8.0
3s-software ≫ Codesys Gateway-server Version2.3.8.1
3s-software ≫ Codesys Gateway-server Version2.3.8.2
3s-software ≫ Codesys Gateway-server Version2.3.9
3s-software ≫ Codesys Gateway-server Version2.3.9.1
3s-software ≫ Codesys Gateway-server Version2.3.9.2
3s-software ≫ Codesys Gateway-server Version2.3.9.3
3s-software ≫ Codesys Gateway-server Version2.3.9.4
3s-software ≫ Codesys Gateway-server Version2.3.9.5
3s-software ≫ Codesys Gateway-server Version2.3.9.18
3s-software ≫ Codesys Gateway-server Version2.3.9.19
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 70.39% | 0.986 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.