CVE-2016-6255

Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
References
Link Resource
http://www.debian.org/security/2016/dsa-3736 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/07/18/13 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/07/20/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/92050 Third Party Advisory VDB Entry
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201701-52
https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog Release Notes Third Party Advisory
https://twitter.com/mjg59/status/755062278513319936 Third Party Advisory
https://www.exploit-db.com/exploits/40589/
https://www.tenable.com/security/research/tra-2017-10
http://www.debian.org/security/2016/dsa-3736 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/07/18/13 Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/07/20/5 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/92050 Third Party Advisory VDB Entry
https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd Issue Tracking Patch Third Party Advisory
https://security.gentoo.org/glsa/201701-52
https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog Release Notes Third Party Advisory
https://twitter.com/mjg59/status/755062278513319936 Third Party Advisory
https://www.exploit-db.com/exploits/40589/
https://www.tenable.com/security/research/tra-2017-10
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:libupnp_project:libupnp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:55

Type Values Removed Values Added
References () http://www.debian.org/security/2016/dsa-3736 - Third Party Advisory () http://www.debian.org/security/2016/dsa-3736 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/07/18/13 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/07/18/13 - Mailing List, Patch, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/07/20/5 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/07/20/5 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/92050 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92050 - Third Party Advisory, VDB Entry
References () https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd - Issue Tracking, Patch, Third Party Advisory () https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd - Issue Tracking, Patch, Third Party Advisory
References () https://security.gentoo.org/glsa/201701-52 - () https://security.gentoo.org/glsa/201701-52 -
References () https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog - Release Notes, Third Party Advisory () https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog - Release Notes, Third Party Advisory
References () https://twitter.com/mjg59/status/755062278513319936 - Third Party Advisory () https://twitter.com/mjg59/status/755062278513319936 - Third Party Advisory
References () https://www.exploit-db.com/exploits/40589/ - () https://www.exploit-db.com/exploits/40589/ -
References () https://www.tenable.com/security/research/tra-2017-10 - () https://www.tenable.com/security/research/tra-2017-10 -

Information

Published : 2017-03-07 16:59

Updated : 2024-11-21 02:55


NVD link : CVE-2016-6255

Mitre link : CVE-2016-6255

CVE.ORG link : CVE-2016-6255


JSON object : View

Products Affected

libupnp_project

  • libupnp

debian

  • debian_linux
CWE
CWE-284

Improper Access Control