Bugtraq mailing list archives
Re: [CVE-REQUEST] Foscam <= 11.37.2.48 path traversal vulnerability
From: Frédéric BASSE <basse.frederic () gmail com>
Date: Wed, 13 Mar 2013 16:01:47 +0100
CVE Assigned: CVE-2013-2560. 2013/3/2 Frédéric BASSE <basse.frederic () gmail com>:
[CVE-REQUEST] Foscam <= 11.37.2.48 path traversal vulnerability _______________________________________________________________________ Summary: Foscam firmware <= 11.37.2.48 is prone to a path traversal vulnerability in the embedded web interface. The unauthenticated attacker can access to the entire filesystem and steal web & wifi credentials. _______________________________________________________________________ Details: GET //../proc/kcore HTTP/1.0 ____________________________________________________________________ CVSS Version 2 Metrics: Access Vector: Network exploitable Access Complexity: Low Authentication: Not required to exploit Confidentiality Impact: Complete Availability Impact: Complete _______________________________________________________________________ Disclosure Timeline: 2013-01-18 Vendor fixed the issue in fw 11.37.2.49; no security notice 2013-02-21 Vulnerability found 2013-03-01 Public advisory _______________________________________________________________________ Solution: A new firmware is available on vendor's site: http://www.foscam.com/down3.aspx _______________________________________________________________________ References: http://code.google.com/p/bflt-utils/ http://wiki.openipcam.com/ _______________________________________________________________________ Arnaud Calmejane - Frederic Basse
Current thread:
- [CVE-REQUEST] Foscam <= 11.37.2.48 path traversal vulnerability Frédéric Basse (Mar 04)
- <Possible follow-ups>
- Re: [CVE-REQUEST] Foscam <= 11.37.2.48 path traversal vulnerability Frédéric BASSE (Mar 13)