CVE-2021-37196 is a vulnerability in Siemens Comos
Published on January 11, 2022
A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.3 (All versions >= V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS unpacks specially crafted archive files to relative paths. This vulnerability could allow an attacker to store files in any folder accessible by the COMOS Web webservice.
Weakness Type
Relative Path Traversal
The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Products Associated with CVE-2021-37196
Want to know whenever a new CVE is published for Siemens Comos? stack.watch will email you.
Affected Versions
Siemens COMOS V10.2:- Version All versions only if web components are used is affected.
- Version All versions < V10.3.3.3 only if web components are used is affected.
- Version All versions >= V10.3.3.3 only if web components are used is affected.
- Version All versions < V10.4.1 only if web components are used is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.