PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.
History

Fri, 16 May 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 May 2025 13:00:00 +0000

Type Values Removed Values Added
Description PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.
Title Path Traversal vulnerability in PNETLab
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-05-16T12:40:17.878Z

Updated: 2025-05-16T12:59:59.664Z

Reserved: 2025-04-16T08:38:09.207Z

Link: CVE-2025-40629

cve-icon Vulnrichment

Updated: 2025-05-16T12:59:56.553Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-16T13:15:52.543

Modified: 2025-05-16T14:42:18.700

Link: CVE-2025-40629

cve-icon Redhat

No data.