The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.

Project Subscriptions

Vendors Products
Vsm Ltc Timesync Subscribe
Advisories

No advisories yet.

Fixes

Solution

The vendor provides a patch in versions after v4.5 which can be downloaded from the following URL, such as version 4.5.6.0, see:  lawo.com/lawo-downloads/ https://lawo.com/lawo-downloads/


Workaround

No workaround given by the vendor.

History

Fri, 22 Nov 2024 12:00:00 +0000

Type Values Removed Values Added
References

Thu, 24 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Lawo
Lawo vsm Ltc Timesync
CPEs cpe:2.3:a:lawo:vsm_ltc_timesync:*:*:*:*:*:*:*:*
Vendors & Products Lawo
Lawo vsm Ltc Timesync
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 24 Oct 2024 08:00:00 +0000

Type Values Removed Values Added
Description The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
Title Unauthenticated Path Traversal
Weaknesses CWE-32
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2024-10-25T06:03:39.593Z

Reserved: 2024-06-17T06:58:37.124Z

Link: CVE-2024-6049

cve-icon Vulnrichment

Updated: 2024-10-25T06:03:39.593Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-24T08:15:02.297

Modified: 2024-11-21T09:48:50.500

Link: CVE-2024-6049

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses