Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-39479", "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "state": "PUBLISHED", "assignerShortName": "zdi", "dateReserved": "2023-08-02T21:37:23.125Z", "datePublished": "2024-05-03T02:10:44.345Z", "dateUpdated": "2024-08-02T18:10:20.883Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi", "dateUpdated": "2024-05-03T02:10:44.345Z"}, "title": "Softing Secure Integration Server OPC UA Gateway Directory Creation Vulnerability", "descriptions": [{"lang": "en", "value": "Softing Secure Integration Server OPC UA Gateway Directory Creation Vulnerability. This vulnerability allows remote attackers to create directories on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20548."}], "affected": [{"vendor": "Softing", "product": "Secure Integration Server", "versions": [{"version": "1.22.0.8686", "status": "affected"}], "defaultStatus": "unknown"}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-552", "description": "CWE-552: Files or Directories Accessible to External Parties", "type": "CWE"}]}], "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1061/", "name": "ZDI-23-1061", "tags": ["x_research-advisory"]}], "dateAssigned": "2023-08-02T16:44:31.520-05:00", "datePublic": "2023-08-09T13:04:34.926-05:00", "source": {"lang": "en", "value": "\tClaroty Research - Team82 - Uri Katz, Noam Moshe, Vera Mens, Sharon Brizinov"}, "metrics": [{"format": "CVSS", "cvssV3_0": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "baseScore": 6.6, "baseSeverity": "MEDIUM"}}]}, "adp": [{"title": "CISA ADP Vulnrichment", "metrics": [{"other": {"type": "ssvc", "content": {"id": "CVE-2023-39479", "role": "CISA Coordinator", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "version": "2.0.3", "timestamp": "2024-05-06T15:40:12.735732Z"}}}], "affected": [{"cpes": ["cpe:2.3:a:softing:secure_integration_server:-:*:*:*:*:*:*:*"], "vendor": "softing", "product": "secure_integration_server", "versions": [{"status": "affected", "version": "1.22.0.8686"}], "defaultStatus": "unknown"}], "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-06-04T17:27:01.463Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T18:10:20.883Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1061/", "name": "ZDI-23-1061", "tags": ["x_research-advisory", "x_transferred"]}]}]}}