CVE-2022-38451

A directory traversal vulnerability exists in the httpd update.cgi functionality of FreshTomato 2022.5. A specially crafted HTTP request can lead to arbitrary file read. An attacker can send an HTTP request to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:o:freshtomato:freshtomato:2022.5:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*
cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:16

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1642 -
References () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2022-1642 - Exploit, Third Party Advisory
Summary
  • (es) Existe una vulnerabilidad de Directorio Traversal en la funcionalidad httpd update.cgi de FreshTomato 2022.5. Una solicitud HTTP especialmente manipulada puede provocar la lectura de archivos arbitrarios. Un atacante puede enviar una solicitud HTTP para desencadenar esta vulnerabilidad.

Information

Published : 2023-01-30 11:15

Updated : 2024-11-21 07:16


NVD link : CVE-2022-38451

Mitre link : CVE-2022-38451

CVE.ORG link : CVE-2022-38451


JSON object : View

Products Affected

siretta

  • quartz-gold_firmware
  • quartz-gold

freshtomato

  • freshtomato
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')