CVE-2010-2466

The S2 Security NetBox, possibly 2.x and 3.x, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, does not properly prevent downloading of database backups, which allows remote attackers to obtain sensitive information via requests for full_*.dar files with predictable filenames.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://blip.tv/file/3414004 - Exploit () http://blip.tv/file/3414004 - Exploit
References () http://www.darkreading.com/blog/archives/2010/04/attacking_door.html - () http://www.darkreading.com/blog/archives/2010/04/attacking_door.html -
References () http://www.kb.cert.org/vuls/id/228737 - US Government Resource () http://www.kb.cert.org/vuls/id/228737 - US Government Resource
References () http://www.securityinfowatch.com/Executives+Columns+%2526+Features/1316527?pageNum=2 - () http://www.securityinfowatch.com/Executives+Columns+%2526+Features/1316527?pageNum=2 -
References () http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon - Exploit () http://www.slideshare.net/shawn_merdinger/we-dont-need-no-stinkin-badges-hacking-electronic-door-access-controllersquot-shawn-merdinger-carolinacon - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/59826 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/59826 -

Information

Published : 2010-06-25 21:30

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2466

Mitre link : CVE-2010-2466

CVE.ORG link : CVE-2010-2466


JSON object : View

Products Affected

linearcorp

  • emerge_50
  • emerge_5000

s2sys

  • netbox

sonitrol

  • eaccess
CWE
CWE-264

Permissions, Privileges, and Access Controls