Directory traversal vulnerability in the administrative web server in Swann DVR4-SecuraNet allows remote attackers to read arbitrary files via a .. (dot dot) in the URI, as demonstrated by reading the vy_netman.cfg file that contains passwords.
References
Configurations
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/51897 - | |
References | () http://packetstorm.linuxsecurity.com/0902-exploits/cctv-disclose.txt - Exploit | |
References | () http://secunia.com/advisories/33861 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/500789/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/33716 - Exploit |
Information
Published : 2009-02-20 06:47
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0640
Mitre link : CVE-2009-0640
CVE.ORG link : CVE-2009-0640
JSON object : View
Products Affected
swannsecurity
- dvr4-securanet
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')