An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/102494 | vdb entry third party advisory |
https://ics-cert.us-cert.gov/advisories/ICSA-18-011-02 | third party advisory us government resource |