CVE-2011-4876

Loading...

General

Score:9.3/10.0
Severity:High
Category:Path Manipulation
Exploit:Available

Impact Metrics

Confidentiality:Complete
Integrity:Complete
Availability:Complete

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Published on 03/02/12 - Updated on 29/08/17

Description

Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string.

Category: Path Manipulation

CWE-22 (Path Traversal)
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

Security Notices

US National Vulnerability DatabaseCVE-2011-4876

Exploits

Exploit-DBEDB-18166

Relative technologies

VendorProduct
siemenssimatic_hmi_panels
siemenswincc
siemenswincc_flexible
siemenswincc_flexible_runtime
siemenswincc_runtime_advanced

Share this vulnerability with:

Twitter Facebook LinkedIn Mail