PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory.
Metrics
Affected Vendors & Products
References
History
Fri, 16 May 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 16 May 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PNETLab 4.2.10 does not properly sanitize user inputs in its file access mechanisms. This allows attackers to perform directory traversal by manipulating file paths in HTTP requests. Specifically, the application is vulnerable to requests that access sensitive files outside the intended directory. | |
Title | Path Traversal vulnerability in PNETLab | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: INCIBE
Published: 2025-05-16T12:40:17.878Z
Updated: 2025-05-16T12:59:59.664Z
Reserved: 2025-04-16T08:38:09.207Z
Link: CVE-2025-40629

Updated: 2025-05-16T12:59:56.553Z

Status : Awaiting Analysis
Published: 2025-05-16T13:15:52.543
Modified: 2025-05-16T14:42:18.700
Link: CVE-2025-40629

No data.