Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46655 | The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to. |
Solution
Campbell Scientific recommends users to update to the version. For user of CSI Web Server update to the most recent CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch For users of RTMC Pro 5 update to the most recent RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch For users of RTMC Pro 4 update to the most recent RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch . Contact Campbell Scientific https://www.campbellsci.com/contact for more details.
Workaround
No workaround given by the vendor.
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T21:11:12.744Z
Reserved: 2024-05-28T13:59:13.434Z
Link: CVE-2024-5433
Updated: 2024-08-01T21:11:12.744Z
Status : Awaiting Analysis
Published: 2024-05-28T19:15:11.500
Modified: 2024-11-21T09:47:40.537
Link: CVE-2024-5433
No data.
OpenCVE Enrichment
No data.
EUVD