Source |
CVE Liste |
Identifiant |
8396118 |
Date de publication |
2023-10-16 07:15:08 (vue: 2023-10-16 11:07:33) |
Titre |
CVE-2023-21415 |
Texte |
Sandro Poppi, membre du programme Axis OS Bug Bounty, a constaté que l'API VAPIX Overlay_del.cgi est vulnérable aux attaques de traversée de chemin qui permet la suppression de fichiers.Ce défaut ne peut être exploité qu'après l'authentification avec un compte de service primaire de l'opérateur ou de l'administrateur.Axis a libéré les versions de système d'exploitation Axis patché pour la faille en surbrillance.Veuillez vous référer à l'Axis Security Advisory pour plus d'informations et de solution.
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
Notes |
|
Envoyé |
Oui |
Condensat |
2023 21415 account administrator advisory after allows api attacks authenticating axis bounty bug can cgi cve del deletion exploited file flaw found has highlighted information member more only operator overlay patched path please poppi privileged program refer released sandro security service solution traversal vapix versions vulnerable |
Tags |
|
Stories |
|
Move |
|