Vulnerability CVE-2016-1525


Published: 2016-02-12   Modified: 2016-02-13

Description:
Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.

See advisories in our WLB2 database:
Topic
Author
Date
High
Netgear Pro NMS 300 Code Execution / File Download
Pedro Ribeiro
07.02.2016
High
NETGEAR ProSafe Network Management System 300 Arbitrary File Upload
Pedro Ribeiro
01.03.2016

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Netgear -> Prosafe netgear management system 300 
Netgear -> Prosafe network management software 300 

 References:
http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html
http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html
http://seclists.org/fulldisclosure/2016/Feb/30
http://www.kb.cert.org/vuls/id/777024
http://www.rapid7.com/db/modules/exploit/windows/http/netgear_nms_rce
http://www.securityfocus.com/archive/1/537446/100/0/threaded
https://www.exploit-db.com/exploits/39412/
https://www.exploit-db.com/exploits/39515/

Copyright 2024, cxsecurity.com

 

Back to Top