Entes EMG12 versions 2.57 and prior an information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user and execute arbitrary code.
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03 | third party advisory us government resource |
http://www.securityfocus.com/bid/105489 | vdb entry third party advisory |