ID

VAR-201305-0420


TITLE

D-Link DNS-323 ShareCenter Remote Directory Traversal Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2013-04841

DESCRIPTION

When you click the \"Save To\" text box or the \"Browse\" button, the directory on the \"Volume_1\" share will pop up. Click the \"+\" sign to expand the directory. You can send a POST request with the following parameters to /goform/GetNewDir: fNEW_DIR /mnt/ Volume_1f_backup 0f_IP_address <ip address of NAS>f_file 0 Because the fNEW_DIR variable is not fully filtered, the attacker is allowed to upload malicious files to any directory through the directory traversal sequence, such as /etc/shadow. When clicking the \"play button\" that you plan to download, the request submitted to /goform/right_now_d can include the following parameters: T1 <at job id>, SCHEDULE<num>, <user>, <source>, <destination>, <num > The SCHEDULE<num> parameter is not properly filtered, allowing remote attackers to exploit the vulnerability to inject arbitrary OS commands and execute with WEB privileges. D-Link DNS-320 ShareCenter is a gigabit network storage of Taiwan D-Link Group. A remote command execution vulnerability and a directory traversal vulnerability exist in the D-Link DNS-323 ShareCenter. An attacker could use these vulnerabilities to execute arbitrary commands and perform arbitrary access to arbitrary files in the context of an affected device by using a directory traversal string. Vulnerabilities exist in D-Link DNS-323 ShareCenter firmware version 1.09. Other versions may also be affected

Trust: 1.89

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842 // CNNVD: CNNVD-201305-073 // BID: 59614

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842

AFFECTED PRODUCTS

vendor:d linkmodel:dns-323scope:eqversion:1.09

Trust: 1.2

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2013-04841
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-04842
value: HIGH

Trust: 0.6

CNVD: CNVD-2013-04841
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2013-04842
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201305-073

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 59614

EXTERNAL IDS

db:BIDid:59614

Trust: 2.1

db:CNVDid:CNVD-2013-04841

Trust: 0.6

db:CNVDid:CNVD-2013-04842

Trust: 0.6

db:CNNVDid:CNNVD-201305-073

Trust: 0.6

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842 // BID: 59614 // CNNVD: CNNVD-201305-073

REFERENCES

url:http://1337day.com/exploit/20724

Trust: 1.2

url:http://www.securityfocus.com/bid/59614

Trust: 0.6

url:http://www.dlink.com/

Trust: 0.3

sources: CNVD: CNVD-2013-04841 // CNVD: CNVD-2013-04842 // BID: 59614 // CNNVD: CNNVD-201305-073

CREDITS

sghctoma

Trust: 0.9

sources: BID: 59614 // CNNVD: CNNVD-201305-073

SOURCES

db:CNVDid:CNVD-2013-04841
db:CNVDid:CNVD-2013-04842
db:BIDid:59614
db:CNNVDid:CNNVD-201305-073

LAST UPDATE DATE

2022-05-17T01:45:24.982000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-04841date:2013-05-07T00:00:00
db:CNVDid:CNVD-2013-04842date:2013-05-07T00:00:00
db:BIDid:59614date:2013-05-02T00:00:00
db:CNNVDid:CNNVD-201305-073date:2013-05-03T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-04841date:2013-05-07T00:00:00
db:CNVDid:CNVD-2013-04842date:2013-05-07T00:00:00
db:BIDid:59614date:2013-05-02T00:00:00
db:CNNVDid:CNNVD-201305-073date:2013-05-03T00:00:00