Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file.
References
Link | Resource |
---|---|
http://en.hongdian.com/Products/Details/H8922 | Product Vendor Advisory |
https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-05-06T15:12:30
Updated: 2021-05-06T15:12:30
Reserved: 2021-03-11T00:00:00
Link: CVE-2021-28149
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-05-06T16:15:07.330
Modified: 2021-05-13T18:55:08.863
Link: CVE-2021-28149
JSON object: View
Redhat Information
No data.
CWE