Vulnerability CVE-2013-2751


Published: 2013-12-12

Description:
Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."

See advisories in our WLB2 database:
Topic
Author
Date
High
NETGEAR ReadyNAS Perl Code Evaluation
Juan vazquez
26.11.2013

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Netgear -> Raidiator 

 References:
http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html
http://www.exploit-db.com/exploits/29815
http://www.readynas.com/?p=7002
http://www.tripwire.com/register/security-advisory-netgear-readynas/
http://www.tripwire.com/state-of-security/vulnerability-management/readynas-flaw-allows-root-access-unauthenticated-http-request/

Copyright 2020, cxsecurity.com

 

Back to Top