SB2024040822 - Multiple vulnerabilities in Open Automation Software OAS Platform



SB2024040822 - Multiple vulnerabilities in Open Automation Software OAS Platform

Published: April 8, 2024

Security Bulletin ID SB2024040822
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2024-27201)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to insufficient validation of user-supplied input in the OAS Engine User Configuration functionality. A remote administrator can pass specially crafted input to the application and cause unexpected data in the configuration.


2) External Control of File Name or Path (CVE-ID: CVE-2024-22178)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to application allows an attacker to control path of the files within the OAS Engine Save Security Configuration functionality. A remote administrator can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.


3) External Control of File Name or Path (CVE-ID: CVE-2024-21870)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to application allows an attacker to control path of the files within the OAS Engine Tags Configuration functionality. A remote administrator can send a specially crafted HTTP request and create or overwrite arbitrary files on the system.


4) Improper Handling of Length Parameter Inconsistency (CVE-ID: CVE-2024-24976)

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of length parameter inconsistency in the OAS Engine File Data Source Configuration functionality. A remote administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.