cve-2024-5433
Vulnerability from cvelistv5
Published
2024-05-28 18:39
Modified
2024-08-01 21:11
Severity ?
EPSS score ?
Summary
Path Traversal in Campbell Scientific CSI Web Server and RTMC
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Campbell Scientific | CSI Web Server and RTMC |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5433", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T16:52:58.731269Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:01:50.606Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:11:12.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CSI Web Server and RTMC", "vendor": "Campbell Scientific", "versions": [ { "status": "affected", "version": "CSI Web Server 1.6" }, { "status": "affected", "version": "RTMC 5.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Patrick K. Sheehan, Grant Hume, and Donald Macary reported these vulnerabilities to CISA." } ], "datePublic": "2024-05-28T18:19:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to.\u003c/span\u003e" } ], "value": "The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-28T18:39:48.285Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCampbell Scientific recommends users to update to the version.\u003cbr\u003eFor user of CSI Web Server update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/csi-web-server-patch\"\u003eCSI Web Server 1.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 5 update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-5-patch\"\u003eRTMC Pro 5.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 4 update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-patch\"\u003eRTMC Pro 4.x patch\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eContact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/contact\"\u003eCampbell Scientific\u003c/a\u003e\u0026nbsp;for more details.\u003c/p\u003e" } ], "value": "Campbell Scientific recommends users to update to the version.\nFor user of CSI Web Server update to the most recent CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch \n\nFor users of RTMC Pro 5 update to the most recent RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch \n\nFor users of RTMC Pro 4 update to the most recent RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch .\n\nContact Campbell Scientific https://www.campbellsci.com/contact \u00a0for more details." } ], "source": { "discovery": "UNKNOWN" }, "title": "Path Traversal in Campbell Scientific CSI Web Server and RTMC", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-5433", "datePublished": "2024-05-28T18:39:48.285Z", "dateReserved": "2024-05-28T13:59:13.434Z", "dateUpdated": "2024-08-01T21:11:12.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-5433\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-05-28T19:15:11.500\",\"lastModified\":\"2024-11-21T09:47:40.537\",\"vulnStatus\":\"Awaiting Analysis\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Campbell Scientific CSI Web Server supports a command that will return the most recent file that matches a given expression. A specially crafted expression can lead to a path traversal vulnerability. This command combined with a specially crafted expression allows anonymous, unauthenticated access (allowed by default) by an attacker to files and directories outside of the webserver root directory they should be restricted to.\"},{\"lang\":\"es\",\"value\":\"El servidor web Campbell Scientific CSI admite un comando que devolver\u00e1 el archivo m\u00e1s reciente que coincida con una expresi\u00f3n determinada. Una expresi\u00f3n especialmente manipulada puede provocar una vulnerabilidad de path traversal. Este comando combinado con una expresi\u00f3n especialmente manipulada permite el acceso an\u00f3nimo y no autenticado (permitido de forma predeterminada) por parte de un atacante a archivos y directorios fuera del directorio ra\u00edz del servidor web al que deber\u00edan estar restringidos.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnerableSystemConfidentiality\":\"LOW\",\"vulnerableSystemIntegrity\":\"LOW\",\"vulnerableSystemAvailability\":\"NONE\",\"subsequentSystemConfidentiality\":\"NONE\",\"subsequentSystemIntegrity\":\"NONE\",\"subsequentSystemAvailability\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirements\":\"NOT_DEFINED\",\"integrityRequirements\":\"NOT_DEFINED\",\"availabilityRequirements\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnerableSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedVulnerableSystemIntegrity\":\"NOT_DEFINED\",\"modifiedVulnerableSystemAvailability\":\"NOT_DEFINED\",\"modifiedSubsequentSystemConfidentiality\":\"NOT_DEFINED\",\"modifiedSubsequentSystemIntegrity\":\"NOT_DEFINED\",\"modifiedSubsequentSystemAvailability\":\"NOT_DEFINED\",\"safety\":\"NOT_DEFINED\",\"automatable\":\"NOT_DEFINED\",\"recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.