The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
Solution:
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '...' (triple dot) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://r.sec-consult.com/lawo | third party advisory |
https://lawo.com/lawo-downloads/ | patch |
http://seclists.org/fulldisclosure/2024/Oct/7 |