The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
The vendor provides a patch in versions after v4.5 which can be downloaded from the following URL, such as version 4.5.6.0, see: lawo.com/lawo-downloads/ https://lawo.com/lawo-downloads/
Configurations
Workarounds
Exploits
SEC Consult has published proof of concept code for this vulnerability.