Seagate Media Server Path Traversal

Credit: Yorick Koster
Risk: Medium
Local: No
Remote: Yes

------------------------------------------------------------------------ Seagate Media Server path traversal vulnerability ------------------------------------------------------------------------ Yorick Koster, September 2017 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ Seagate Personal Cloud is a consumer-grade Network-Attached Storage device (NAS). It was found that Seagate Media Server is vulnerable to path traversal that allows unauthenticated attackers to download arbitrary files from the NAS. Since Seagate Media Server runs with root privileges it is possible to exploit this issue to retrieve sensitive information from the NAS. ------------------------------------------------------------------------ Tested versions ------------------------------------------------------------------------ This issue was tested on a Seagate Personal Cloud model SRN21C running firmware versions and It is likely that other devices/models are also affected. ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ This issue has been fixed in firmware version ------------------------------------------------------------------------ Details ------------------------------------------------------------------------

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top