CVE-2018-15745

Argus Surveillance DVR 4.0.0.0 devices allow Unauthenticated Directory Traversal, leading to File Disclosure via a ..%2F in the WEBACCOUNT.CGI RESULTPAGE parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:argussurveillance:dvr:4.0.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:51

Type Values Removed Values Added
References () http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt - Exploit, Third Party Advisory () http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/149134/Argus-Surveillance-DVR-4.0.0.0-Directory-Traversal.html - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/45296/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45296/ - Third Party Advisory, VDB Entry

Information

Published : 2018-08-30 17:29

Updated : 2024-11-21 03:51


NVD link : CVE-2018-15745

Mitre link : CVE-2018-15745

CVE.ORG link : CVE-2018-15745


JSON object : View

Products Affected

argussurveillance

  • dvr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')