CVE-2022-1373
17.08.2022, 21:15
The restore configuration feature of Softing Secure Integration Server V1.22 is vulnerable to a directory traversal vulnerability when processing zip files. An attacker can craft a zip file to load an arbitrary dll and execute code. Using the "restore configuration" feature to upload a zip file containing a path traversal file may cause a file to be created and executed upon touching the disk.
Vendor | Product | Version |
---|---|---|
softing | edgeaggregator | 3.1 |
softing | edgeconnector | 3.1 |
softing | opc | 5.2 |
softing | secure_integration_server | 1.22 |
softing | uagates | 1.74 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-23 - Relative Path TraversalThe software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.