Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-053/ |
![]() ![]() |
History
Wed, 19 Feb 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Santesoft
Santesoft sante Pacs Server |
|
CPEs | cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Santesoft
Santesoft sante Pacs Server |
|
Metrics |
cvssV3_1
|
Mon, 10 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 30 Jan 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309. | |
Title | Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-10T22:08:24.901Z
Reserved: 2025-01-19T03:32:05.014Z
Link: CVE-2025-0573

Updated: 2025-01-31T16:36:26.085Z

Status : Analyzed
Published: 2025-01-30T21:15:14.227
Modified: 2025-02-19T19:26:10.080
Link: CVE-2025-0573

No data.