Absolute path traversal vulnerability in file in Enigma2 Webinterface 1.6.0 through 1.6.8, 1.6rc3, and 1.7.0 allows remote attackers to read arbitrary files via a full pathname in the file parameter.
Vector
NETWORK
Complexity
LOW
Authentication
NONE
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE
Dream-multimedia-tv Enigma2 webinterface 1.6.0 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.6 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.2 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.4 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.1 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.7.0 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.3 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.8 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.5 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6 Rc3 (not an official CPE)
Dream-multimedia-tv Enigma2 webinterface 1.6.7 (not an official CPE)
Advisory | Patch | Confirmed | Link |
---|---|---|---|
18343 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)