Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html - Third Party Advisory, VDB Entry | |
References | () http://www.exploit-db.com/exploits/29815 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/98826 - Broken Link | |
References | () http://www.readynas.com/?p=7002 - Patch, Vendor Advisory | |
References | () http://www.tripwire.com/register/security-advisory-netgear-readynas/ - Third Party Advisory | |
References | () http://www.tripwire.com/state-of-security/vulnerability-management/readynas-flaw-allows-root-access-unauthenticated-http-request/ - Third Party Advisory |
Information
Published : 2013-12-12 18:55
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2751
Mitre link : CVE-2013-2751
CVE.ORG link : CVE-2013-2751
JSON object : View
Products Affected
netgear
- raidiator
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')