The web server of Lawo AG vsm LTC Time Sync (vTimeSync)...
High severity
Unreviewed
Published
Oct 24, 2024
to the GitHub Advisory Database
•
Updated Oct 24, 2024
Description
Published by the National Vulnerability Database
Oct 24, 2024
Published to the GitHub Advisory Database
Oct 24, 2024
Last updated
Oct 24, 2024
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
References