A path traversal vulnerability of the WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service.
History

Wed, 02 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 09:30:00 +0000

Type Values Removed Values Added
Description Path traversal in WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service. A path traversal vulnerability of the WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service.
Title Operating System Misconfiguration in Infinera G42 Path Traversal Vulnerability in Infinera G42
Weaknesses CWE-22

Wed, 02 Jul 2025 09:00:00 +0000

Type Values Removed Values Added
Description Path traversal in WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service.
Title Operating System Misconfiguration in Infinera G42
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ENISA

Published: 2025-07-02T08:52:54.406Z

Updated: 2025-07-02T13:14:45.299Z

Reserved: 2025-02-18T06:59:55.889Z

Link: CVE-2025-27022

cve-icon Vulnrichment

Updated: 2025-07-02T13:06:46.927Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-02T09:15:25.290

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-27022

cve-icon Redhat

No data.