Description
Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
Published: 2021-09-07
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update to TimeNet version 10.2.1

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-23310 Synerion TimeNet version 9.21 contains a directory traversal vulnerability where, on the "Name" parameter, the attacker can return to the root directory and open the host file. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
History

No history.

Subscriptions

Synerion Timenet
cve-icon MITRE

Status: PUBLISHED

Assigner: INCD

Published:

Updated: 2024-08-04T01:01:59.243Z

Reserved: 2021-07-12T00:00:00.000Z

Link: CVE-2021-36717

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-07T12:15:07.620

Modified: 2024-11-21T06:13:58.143

Link: CVE-2021-36717

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses