CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.us-cert.gov/ics/advisories/icsa-19-255-01 | Mitigation Patch Third Party Advisory US Government Resource | 
| https://www.us-cert.gov/ics/advisories/icsa-19-255-01 | Mitigation Patch Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 04:25
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.us-cert.gov/ics/advisories/icsa-19-255-01 - Mitigation, Patch, Third Party Advisory, US Government Resource | 
Information
                Published : 2019-09-13 17:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13532
Mitre link : CVE-2019-13532
CVE.ORG link : CVE-2019-13532
JSON object : View
Products Affected
                codesys
- control_for_iot2000
- control_for_linux
- control_for_raspberry_pi
- control_rte
- hmi
- control_runtime_system_toolkit
- control_for_beaglebone
- embedded_target_visu_toolkit
- control_for_pfc200
- control_win
- control_for_empc-a\/imx6
- remote_target_visu_toolkit
- control_for_pfc100
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
