The response messages received from the eSOMS report generation using certain parameter queries with full file path can be
abused for enumerating the local file system structure.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57827 | The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure. |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Hitachi Energy
Published:
Updated: 2025-02-27T20:36:52.539Z
Reserved: 2023-10-11T01:30:06.720Z
Link: CVE-2023-5514
Updated: 2024-08-02T07:59:44.760Z
Status : Modified
Published: 2023-11-01T03:15:07.933
Modified: 2024-11-21T08:41:55.110
Link: CVE-2023-5514
No data.
OpenCVE Enrichment
No data.
EUVD