The web interface of Gira Giersiepen Gira KNX/IP-Router 3.1.3683.0 and 3.3.8.0 allows a remote attacker to read sensitive files via directory-traversal sequences in the URL.
References
Link | Resource |
---|---|
https://www.syss.de/en/responsible-disclosure-policy | Not Applicable |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt | Exploit Third Party Advisory |
https://www.syss.de/en/responsible-disclosure-policy | Not Applicable |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-015.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-06-29 16:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33277
Mitre link : CVE-2023-33277
CVE.ORG link : CVE-2023-33277
JSON object : View
Products Affected
gira
- knx_ip_router_firmware
- knx_ip_router
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')