Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:45654
HistoryFeb 27, 2024 - 9:57 a.m.

Path Traversal

2024-02-2709:57:36
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
2
esphome
web server
path traversal
vulnerability
remote code execution

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%

esphome is vulnerable to Path Traversal. The vulnerability is due to a lack of file extension validation within web_server.py. If the attacker can write arbitrary content to a file and the system processes that file as code, they might achieve Remote Code Execution (RCE).

CPENameOperatorVersion
esphomele2024.2.0b1
esphomele2024.2.0b1

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.5%

Related for VERACODE:45654