An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url "/port_3480". It seems that the UPnP services provide "file" as one of the service actions for a normal user to read a file that is stored under the /etc/cmh-lu folder. It retrieves the value from the "parameters" query string variable and then passes it to an internal function "FileUtils::ReadFileIntoBuffer" which is a library function that does not perform any sanitization on the value submitted and this allows an attacker to use directory traversal characters "../" and read files from other folders within the device.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-17T19:52:00

Updated: 2019-06-17T19:52:28

Reserved: 2017-06-02T00:00:00


Link: CVE-2017-9382

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-06-17T20:15:09.180

Modified: 2019-06-20T16:44:26.607


Link: CVE-2017-9382

JSON object: View

cve-icon Redhat Information

No data.

CWE