First published: Thu Jun 07 2018(Updated: )
Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Intelligent Power Manager | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-12031 is critical.
The affected software of CVE-2018-12031 is Eaton Intelligent Power Manager version 1.6.
An attacker can exploit CVE-2018-12031 by including a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
Yes, a fix for CVE-2018-12031 is available.
You can find more information about CVE-2018-12031 at the following link: [https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion](https://github.com/EmreOvunc/Eaton-Intelligent-Power-Manager-Local-File-Inclusion)