CVE-2023-6577

A vulnerability was found in Byzoro PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:byzoro:patrolflow-am-2530pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:byzoro:patrolflow-am-2530pro:-:*:*:*:*:*:*:*

History

09 Apr 2024, 09:15

Type Values Removed Values Added
Summary (en) A vulnerability was found in Beijing Baichuo PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability was found in Byzoro PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
  • () https://vuldb.com/?submit.243584 -

12 Dec 2023, 20:37

Type Values Removed Values Added
First Time Byzoro
Byzoro patrolflow-am-2530pro
Byzoro patrolflow-am-2530pro Firmware
CPE cpe:2.3:h:byzoro:patrolflow-am-2530pro:-:*:*:*:*:*:*:*
cpe:2.3:o:byzoro:patrolflow-am-2530pro_firmware:*:*:*:*:*:*:*:*
Summary
  • (es) Una vulnerabilidad fue encontrada en Beijing Baichuo PatrolFlow 2530Pro hasta 20231126 y ha sido calificada como problemática. Este problema afecta un procesamiento desconocido del archivo /log/mailsendview.php. La manipulación del archivo de argumentos con la entrada /boot/phpConfig/tb_admin.txt conduce a un path traversal. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse. A esta vulnerabilidad se le asignó el identificador VDB-247157. NOTA: Se contactó primeramente con el proveedor sobre esta divulgación, pero no respondió de ninguna manera.
References () https://github.com/kpz-wm/cve/blob/main/Any_file_read.md - () https://github.com/kpz-wm/cve/blob/main/Any_file_read.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.247157 - () https://vuldb.com/?ctiid.247157 - Third Party Advisory
References () https://vuldb.com/?id.247157 - () https://vuldb.com/?id.247157 - Third Party Advisory

07 Dec 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-07 21:15

Updated : 2024-04-11 01:23


NVD link : CVE-2023-6577

Mitre link : CVE-2023-6577

CVE.ORG link : CVE-2023-6577


JSON object : View

Products Affected

byzoro

  • patrolflow-am-2530pro_firmware
  • patrolflow-am-2530pro
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')