The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability. Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.
2023-08-17T16:15:09.790
2024-11-21T07:59:34.000
Modified
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rockwellautomation | thinmanager_thinserver | ≤ 11.0.6 | Yes |
Application | rockwellautomation | thinmanager_thinserver | ≤ 11.1.6 | Yes |
Application | rockwellautomation | thinmanager_thinserver | ≤ 11.2.7 | Yes |
Application | rockwellautomation | thinmanager_thinserver | ≤ 12.0.5 | Yes |
Application | rockwellautomation | thinmanager_thinserver | ≤ 12.1.6 | Yes |
Application | rockwellautomation | thinmanager_thinserver | ≤ 13.0.2 | Yes |
Application | rockwellautomation | thinmanager_thinserver | 13.1.0 | Yes |