The CIMPLICITY Web-based access component, CimWebServer, does not check
the location of shell files being loaded into the system. By modifying
the source location, an attacker could send shell code to the
CimWebServer which would deploy the nefarious files as part of any SCADA
project. This could allow the attacker to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
22 Aug 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) The CIMPLICITY Web-based access component, CimWebServer, does not check the location of shell files being loaded into the system. By modifying the source location, an attacker could send shell code to the CimWebServer which would deploy the nefarious files as part of any SCADA project. This could allow the attacker to execute arbitrary code. | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : unknown |
References |
|
Information
Published : 2014-01-25 22:55
Updated : 2025-08-22 23:15
NVD link : CVE-2014-0751
Mitre link : CVE-2014-0751
CVE.ORG link : CVE-2014-0751
JSON object : View
Products Affected
ge
- intelligent_platforms_proficy_hmi\%2fscada_cimplicity
- intelligent_platforms_proficy_process_systems_with_cimplicity
- intelligent_platforms_proficy_hmi\/scada_cimplicity
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')