SB2024040822 - Multiple vulnerabilities in Open Automation Software OAS Platform
Published: April 8, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2024-27201)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in the OAS Engine User Configuration functionality. A remote administrator can pass specially crafted input to the application and cause unexpected data in the configuration.
2) External Control of File Name or Path (CVE-ID: CVE-2024-22178)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to application allows an attacker to control path of the files within the OAS Engine Save Security Configuration functionality. A remote administrator can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.
3) External Control of File Name or Path (CVE-ID: CVE-2024-21870)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to application allows an attacker to control path of the files within the OAS Engine Tags Configuration functionality. A remote administrator can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.
4) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-24976)
The vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper handling of length parameter inconsistency in the OAS Engine File Data Source Configuration functionality. A remote administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.