Vigil@nce - ICONICS WebHMI: directory traversal
June 2016 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
An attacker can traverse directories of ICONICS WebHMI, in order
to read a file outside the service root path.
Impacted products: GENESIS32, GENESIS64.
Severity: 2/4.
Creation date: 01/04/2016.
DESCRIPTION OF THE VULNERABILITY
The ICONICS WebHMI product offers a web service.
However, user’s data are directly inserted in an access path.
Sequences such as "/.." can thus be used to go in the upper
directory.
An attacker can therefore traverse directories of ICONICS WebHMI,
in order to read a file outside the service root path.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/ICONICS-WebHMI-directory-traversal-19281