A path traversal vulnerability of the WebGUI HTTP endpoint in Infinera G42 version R6.1.3
allows remote authenticated users to download all OS files via HTTP
requests.
Details:
Lack or insufficient validation of user-supplied input allows
authenticated users to access all files on the target machine file
system that are readable to the user account used to run the httpd
service.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Path traversal in WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service. | A path traversal vulnerability of the WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service. |
Title | Operating System Misconfiguration in Infinera G42 | Path Traversal Vulnerability in Infinera G42 |
Weaknesses | CWE-22 |
Wed, 02 Jul 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Path traversal in WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows remote authenticated users to download all OS files via HTTP requests. Details: Lack or insufficient validation of user-supplied input allows authenticated users to access all files on the target machine file system that are readable to the user account used to run the httpd service. | |
Title | Operating System Misconfiguration in Infinera G42 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ENISA
Published: 2025-07-02T08:52:54.406Z
Updated: 2025-07-02T13:14:45.299Z
Reserved: 2025-02-18T06:59:55.889Z
Link: CVE-2025-27022

Updated: 2025-07-02T13:06:46.927Z

Status : Awaiting Analysis
Published: 2025-07-02T09:15:25.290
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-27022

No data.