Directory traversal vulnerability in data/config/image.do in NETGEAR Management System NMS300 1.5.0.11 and earlier allows remote authenticated users to read arbitrary files via a .. (dot dot) in the realName parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/135618/Netgear-Pro-NMS-300-Code-Execution-File-Download.html - | |
References | () http://packetstormsecurity.com/files/135999/NETGEAR-ProSafe-Network-Management-System-300-Arbitrary-File-Upload.html - | |
References | () http://seclists.org/fulldisclosure/2016/Feb/30 - | |
References | () http://www.kb.cert.org/vuls/id/777024 - Third Party Advisory, US Government Resource | |
References | () http://www.rapid7.com/db/modules/exploit/windows/http/netgear_nms_rce - | |
References | () http://www.securityfocus.com/archive/1/537446/100/0/threaded - | |
References | () https://www.exploit-db.com/exploits/39412/ - | |
References | () https://www.exploit-db.com/exploits/39515/ - |
Information
Published : 2016-02-13 02:59
Updated : 2024-11-21 02:46
NVD link : CVE-2016-1525
Mitre link : CVE-2016-1525
CVE.ORG link : CVE-2016-1525
JSON object : View
Products Affected
netgear
- prosafe_network_management_software_300
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')