Description
By changing the filename parameter in the request, an attacker could
delete any file with the permissions of the Vuforia server account.
No analysis available yet.
Remediation
Vendor Solution
PTC recommends users upgrade to Vuforia Studio release 9.9 https://support.ptc.com/help/vuforia/studio/en/ or higher.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32754 | By changing the filename parameter in the request, an attacker could delete any file with the permissions of the Vuforia server account. |
References
History
Mon, 06 Jan 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-06T21:22:20.741Z
Reserved: 2023-04-24T23:30:29.256Z
Link: CVE-2023-29152
Updated: 2024-08-02T14:00:15.879Z
Status : Modified
Published: 2023-06-07T22:15:09.737
Modified: 2024-11-21T07:56:37.357
Link: CVE-2023-29152
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD