Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string.
Vector
NETWORK
Complexity
MEDIUM
Authentication
NONE
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE
Siemens Wincc flexible 2007 (not an official CPE)
Siemens Wincc flexible 2008 (not an official CPE)
Siemens Simatic hmi panels Comfort panels (not an official CPE)
Siemens Wincc flexible runtime (not an official CPE)
Siemens Simatic hmi panels Tp (not an official CPE)
Siemens Wincc flexible 2004 (not an official CPE)
Siemens Wincc flexible 2005 (not an official CPE)
Siemens Simatic hmi panels Mp (not an official CPE)
Siemens Wincc V11 (not an official CPE)
Siemens Simatic hmi panels Op (not an official CPE)
Siemens Simatic hmi panels Mobile panels (not an official CPE)
Siemens Wincc runtime advanced V11 (not an official CPE)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)