{ "id": "CVE-2023-39480", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:14.457", "lastModified": "2024-11-21T08:15:30.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Softing Secure Integration Server FileDirectory OPC UA Object Arbitrary File Creation Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Softing Secure Integration Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the handling of FileDirectory OPC UA Objects. The issue results from allowing unauthorized access to the filesystem. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20549." }, { "lang": "es", "value": "Vulnerabilidad de creaci\u00f3n de archivos arbitrarios de objetos OPC UA de Softing Secure Integration Server FileDirectory. Esta vulnerabilidad permite a atacantes remotos crear archivos arbitrarios en las instalaciones afectadas de Softing Secure Integration Server. Aunque se requiere autenticaci\u00f3n para aprovechar esta vulnerabilidad, se puede omitir el mecanismo de autenticaci\u00f3n existente. La falla espec\u00edfica existe en el manejo de objetos FileDirectory OPC UA. El problema surge al permitir el acceso no autorizado al sistema de archivos. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto de la ra\u00edz. Era ZDI-CAN-20549." } ], "metrics": { "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", "baseScore": 4.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 0.7, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-552" } ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1062/", "source": "zdi-disclosures@trendmicro.com" }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1062/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }