CVE-2012-4027

Directory traversal vulnerability in Tridium Niagara AX Framework allows remote attackers to read files outside of the intended images, nav, and px folders by leveraging incorrect permissions, as demonstrated by reading the config.bog file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:*

History

22 Mar 2023, 14:09

Type Values Removed Values Added
CPE cpe:2.3:a:tridium:niagra_ax_framework:*:*:*:*:*:*:*:* cpe:2.3:a:tridium:niagara_ax:*:*:*:*:*:*:*:*
CWE CWE-264 CWE-22
References (CONFIRM) https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf - Vendor Advisory (CONFIRM) https://www.tridium.com/galleries/briefings/NiagaraAX_Framework_Software_Security_Alert.pdf - Broken Link, Vendor Advisory
References (MISC) http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html - (MISC) http://www.washingtonpost.com/investigations/tridiums-niagara-framework-marvel-of-connectivity-illustrates-new-cyber-risks/2012/07/11/gJQARJL6dW_story.html - Permissions Required

Information

Published : 2012-07-16 20:55

Updated : 2024-02-04 18:16


NVD link : CVE-2012-4027

Mitre link : CVE-2012-4027

CVE.ORG link : CVE-2012-4027


JSON object : View

Products Affected

tridium

  • niagara_ax
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')