The BrightSign Digital Signage (4k242) device (Firmware 6.2.63 and below) has directory traversal via the /storage.html rp parameter, allowing an attacker to read or write to files.
References
Link | Resource |
---|---|
http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cve.html | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43364/ | Exploit Issue Tracking Third Party Advisory VDB Entry |
http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cve.html | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43364/ | Exploit Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.information-paradox.net/2017/12/brightsign-multiple-vulnerablities-cve.html - Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43364/ - Exploit, Issue Tracking, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-18 06:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17739
Mitre link : CVE-2017-17739
CVE.ORG link : CVE-2017-17739
JSON object : View
Products Affected
brightsign
- 4k242
- 4k242_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')