MZ Automation libiec61850 hasta 1.4 MMS File Services mms_client_files.c filename directory traversal

Una vulnerabilidad clasificada como crítica ha sido encontrada en MZ Automation libiec61850 hasta 1.4. Una función desconocida del archivo src/mms/iso_mms/client/mms_client_files.c del componente MMS File Services es afectada por esta vulnerabilidad. Mediante la manipulación del parámetro filename de un input desconocido se causa una vulnerabilidad de clase directory traversal. El advisory puede ser descargado de github.com. La vulnerabilidad es identificada como CVE-2022-3976. El ataque puede ser iniciado desde la red local. Los detalles técnicos son conocidos. Fue declarado como no está definido. Una actualización a la versión 1.5 elimina esta vulnerabilidad. La actualización se puede descargar de github.com. El parche puede ser descargado de github.com. El mejor modo sugerido para mitigar el problema es actualizar a la última versión. Una solución posible ha sido publicada incluso antes y no después de la publicación de la vulnerabilidad.

Campo2022-11-13 15:102022-12-17 15:182022-12-17 15:24
vendorMZ AutomationMZ AutomationMZ Automation
namelibiec61850libiec61850libiec61850
version<=1.4<=1.4<=1.4
componentMMS File ServicesMMS File ServicesMMS File Services
filesrc/mms/iso_mms/client/mms_client_files.csrc/mms/iso_mms/client/mms_client_files.csrc/mms/iso_mms/client/mms_client_files.c
argumentfilenamefilenamefilename
cwe22 (directory traversal)22 (directory traversal)22 (directory traversal)
risk222
cvss3_vuldb_acLLL
cvss3_vuldb_sUUU
cvss3_vuldb_cLLL
cvss3_vuldb_iLLL
cvss3_vuldb_aLLL
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
identifier10622ba36bb3910c151348f1569f039ecdd8786f10622ba36bb3910c151348f1569f039ecdd8786f10622ba36bb3910c151348f1569f039ecdd8786f
urlhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786fhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786fhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786f
nameUpgradeUpgradeUpgrade
upgrade_version1.51.51.5
upgrade_urlhttps://github.com/mz-automation/libiec61850https://github.com/mz-automation/libiec61850https://github.com/mz-automation/libiec61850
patch_name10622ba36bb3910c151348f1569f039ecdd8786f10622ba36bb3910c151348f1569f039ecdd8786f10622ba36bb3910c151348f1569f039ecdd8786f
patch_urlhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786fhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786fhttps://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786f
cveCVE-2022-3976CVE-2022-3976CVE-2022-3976
responsibleVulDBVulDBVulDB
date1668294000 (2022-11-13)1668294000 (2022-11-13)1668294000 (2022-11-13)
typeAutomation SoftwareAutomation SoftwareAutomation Software
cvss2_vuldb_acLLL
cvss2_vuldb_ciPPP
cvss2_vuldb_iiPPP
cvss2_vuldb_aiPPP
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_avAAA
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_avAAA
cvss3_vuldb_prLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_eXXX
cvss2_vuldb_basescore5.25.25.2
cvss2_vuldb_tempscore4.54.54.5
cvss3_vuldb_basescore5.55.55.5
cvss3_vuldb_tempscore5.35.35.3
cvss3_meta_basescore5.55.56.6
cvss3_meta_tempscore5.35.36.5
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1668294000 (2022-11-13)1668294000 (2022-11-13)
cve_nvd_summaryA vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556.A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556.
cvss3_nvd_avA
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss3_cna_avA
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cL
cvss3_cna_iL
cvss3_cna_aL
cve_cnaVulDB
cvss3_nvd_basescore8.8
cvss3_cna_basescore5.5

Interested in the pricing of exploits?

See the underground prices here!