Short Name |
SCADA:3S-CODESYS-GWS-DIRTRVRSL
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
SCADA
|
Keywords |
3S CoDeSys Gateway Server Directory Traversal
|
Release Date |
2013/03/15
|
Update Number |
2246
|
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
SCADA: 3S CoDeSys Gateway Server Directory Traversal
This signature detects attempts to exploit a known issue in 3S CoDeSys Gateway Server. Successful attack attempts could allow an attacker to view or overwrite sensitive system files.
Extended Description
Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname.
Affected Products
- 3s-software codesys_gateway-server 2.3.5.1
- 3s-software codesys_gateway-server 2.3.5.2
- 3s-software codesys_gateway-server 2.3.5.3
- 3s-software codesys_gateway-server 2.3.6.0
- 3s-software codesys_gateway-server 2.3.7.0
- 3s-software codesys_gateway-server 2.3.8.0
- 3s-software codesys_gateway-server 2.3.8.1
- 3s-software codesys_gateway-server 2.3.8.2
- 3s-software codesys_gateway-server 2.3.9
- 3s-software codesys_gateway-server 2.3.9.1
- 3s-software codesys_gateway-server 2.3.9.18
- 3s-software codesys_gateway-server 2.3.9.19
- 3s-software codesys_gateway-server 2.3.9.2
- 3s-software codesys_gateway-server 2.3.9.3
- 3s-software codesys_gateway-server 2.3.9.4
- 3s-software codesys_gateway-server 2.3.9.5
- 3s-software codesys_gateway-server up to 2.3.9.20
References