Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-23310 | Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system. |
Fixes
Solution
Update to TimeNet version 10.2.1
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.gov.il/en/departments/faq/cve_advisories |
|
History
No history.
Status: PUBLISHED
Assigner: INCD
Published:
Updated: 2024-08-04T01:01:59.243Z
Reserved: 2021-07-12T00:00:00
Link: CVE-2021-36717
No data.
Status : Modified
Published: 2021-09-07T12:15:07.620
Modified: 2024-11-21T06:13:58.143
Link: CVE-2021-36717
No data.
OpenCVE Enrichment
No data.
EUVD