Update CVE-2024-6049.yaml

patch-13
Dhiyaneshwaran 2024-10-28 06:27:50 +05:30 committed by GitHub
parent ce52409d63
commit b08f3d316b
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 6 additions and 9 deletions

View File

@ -7,25 +7,22 @@ info:
description: |
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
reference:
- https://seclists.org/fulldisclosure/2024/Oct/7
- https://sec-consult.com/vulnerability-lab/advisory/unauthenticated-path-traversal-vulnerability-in-lawo-ag-vsm-ltc-time-sync-vtimesync/
- https://lawo.com/lawo-downloads/
- https://r.sec-consult.com/lawo
- https://packetstormsecurity.com/files/182347/Lawo-AG-vsm-LTC-Time-Sync-Path-Traversal.html
- https://ogma.in/cve-2024-6049-addressing-path-traversal-vulnerability-in-lawo-s-vsm-ltc-time-sync
- https://www.tenable.com/cve/CVE-2024-6049
- https://docs.lawo.com/vsm-ip-broadcast-control-system/vsmgear-user-manual/discontinued-products/vsmltc
- https://sec-consult.com/vulnerability-lab/advisory/unauthenticated-path-traversal-vulnerability-in-lawo-ag-vsm-ltc-time-sync-vtimesync/
- https://nvd.nist.gov/vuln/detail/cve-2024-6049
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-6049
cwe-id: CWE-32
epss-score: 0.00043
epss-percentile: 0.09778
epss-percentile: 0.09833
metadata:
verified: true
max-request: 2
vendor: Lawo AG
product: vTimeSync
tags: cve,cve2024,lawo,lfi
tags: cve,cve2024,lawo,lfi,seclists,packetstorm
flow: http(1) && http(2)