Lucene search

K
zdiNatnael Samson (@NattiSamson)ZDI-24-486
HistoryMay 22, 2024 - 12:00 a.m.

LAquis SCADA LGX Report STRING WRITETOFILE Path Traversal Remote Code Execution Vulnerability

2024-05-2200:00:00
Natnael Samson (@NattiSamson)
www.zerodayinitiative.com
2
laquis scada
lgx report
path traversal
remote code execution
user interaction
string.writetofile
file operations
current user

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.6%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the implementation of the STRING.WRITETOFILE method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user.

6.9 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.6%