Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-15442 | PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 16 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 May 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory. | |
| Title | Path Traversal vulnerability in PNETLab | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-05-16T12:59:59.664Z
Reserved: 2025-04-16T08:38:09.207Z
Link: CVE-2025-40629
Updated: 2025-05-16T12:59:56.553Z
Status : Awaiting Analysis
Published: 2025-05-16T13:15:52.543
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-40629
No data.
OpenCVE Enrichment
No data.
EUVD