CVE-2023-50233Path Traversal in Ignition

CWE-22Path Traversal4 documents4 sources
Severity
8.8HIGHNVD
EPSS
3.7%
top 12.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3
Latest updateMar 5

Description

Inductive Automation Ignition getJavaExecutable Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. User interaction is required to exploit this vulnerability in that the target must connect to a malicious server. The specific flaw exists within the getJavaExecutable method. The issue results from the lack of proper validation of a user-supplied path prior to usi

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDinductiveautomation/ignition8.1.08.1.33

🔴Vulnerability Details

3
OSV
linux vulnerabilities2025-03-05
CVEList
Inductive Automation Ignition getJavaExecutable Directory Traversal Remote Code Execution Vulnerability2024-05-03
GHSA
GHSA-pxh7-6hfh-c7c3: Inductive Automation Ignition getJavaExecutable Directory Traversal Remote Code Execution Vulnerability2024-05-03
CVE-2023-50233 — Path Traversal in Ignition | cvebase