Vulnerability Description
A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sato | Cl4Nx-J Plus Firmware | 1.13.2-u455_r2 |
| Sato | Cl4Nx-J Plus | - |
Related Weaknesses (CWE)
References
- https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20dir/Third Party Advisory
- https://vuldb.com/?ctiid.241028Third Party Advisory
- https://vuldb.com/?id.241028Third Party Advisory
- https://github.com/CV3TR4CK/CV3Cyb3R/blob/main/2023/SATO%20CL4NX-J%20Plus%20dir/Third Party Advisory
- https://vuldb.com/?ctiid.241028Third Party Advisory
- https://vuldb.com/?id.241028Third Party Advisory
FAQ
What is CVE-2023-5327?
CVE-2023-5327 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the ar...
How severe is CVE-2023-5327?
CVE-2023-5327 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5327?
Check the references section above for vendor advisories and patch information. Affected products include: Sato Cl4Nx-J Plus Firmware, Sato Cl4Nx-J Plus.