ID

VAR-201412-0439


CVE

CVE-2014-9238


TITLE

D-link IP camera DCS-2103 Vulnerability to obtain installation path in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2014-005765

DESCRIPTION

D-link IP camera DCS-2103 with firmware 1.0.0 allows remote attackers to obtain the installation path via the file parameter to cgi-bin/sddownload.cgi, as demonstrated by a / (forward slash) character. The D-Link DCS-2103 is a wireless webcam device. D-Link DCS-2103 Firmware 1.0.0 The cgi-bin/sddownload.cgi script failed to properly filter the file parameter data, allowing an attacker to exploit the vulnerability to submit a directory traversal request for sensitive file information. D-Link DCS-2103 is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information. Information harvested may aid in launching further attacks. D-Link DCS-2103 Firmware version 1.0.0 is vulnerable; other versions may also be affected. D-link IP camera DCS-2103 is a network camera product of D-Link. Hello list! There are Directory Traversal and Full path disclosure vulnerabilities in D-Link DCS-2103 (IP camera). I found these vulnerabilities at 11.07.2014 and later informed D-Link. But they haven't answered. It looks like they are busy with fixing vulnerabilities in DAP-1360, which I wrote about earlier. ---------- Details: ---------- Directory Traversal (Arbitrary File Download) (WASC-33): http://site/cgi-bin/sddownload.cgi?file=/../../etc/passwd Full path disclosure (WASC-13): http://site/cgi-bin/sddownload.cgi?file=/ ---------------- Disclosure: ---------------- I disclosed these vulnerabilities at my site (http://websecurity.com.ua/7250/). I found this and other web cameras during summer to watch terrorists activities in Donetsk and Lugansks regions of Ukraine (http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-October/009056.html). You can watch my videos in the playlist Ukrainian Cyber Forces: video reconnaissance http://www.youtube.com/playlist?list=PLk7NS9SMadnj7fwAQJgkbKQdCGTKAFI9Q. Best wishes & regards, MustLive Administrator of Websecurity web site http://websecurity.com.ua

Trust: 2.61

sources: NVD: CVE-2014-9238 // JVNDB: JVNDB-2014-005765 // CNVD: CNVD-2014-08785 // BID: 71484 // VULHUB: VHN-77183 // PACKETSTORM: 129138

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

category:['camera device']sub_category:IP camera

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08785

AFFECTED PRODUCTS

vendor:d linkmodel:dcs-2103 hd cube network camerascope:eqversion:1.0.0

Trust: 1.6

vendor:d linkmodel:dcs-2103scope:eqversion:1.0.0

Trust: 0.9

vendor:d linkmodel:d-link dcs-2103scope: - version: -

Trust: 0.8

vendor:d linkmodel:d-link dcs-2103scope:eqversion:1.0.0

Trust: 0.8

sources: CNVD: CNVD-2014-08785 // BID: 71484 // JVNDB: JVNDB-2014-005765 // CNNVD: CNNVD-201412-058 // NVD: CVE-2014-9238

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9238
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-9238
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-08785
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201412-058
value: MEDIUM

Trust: 0.6

VULHUB: VHN-77183
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-9238
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-08785
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-77183
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-08785 // VULHUB: VHN-77183 // JVNDB: JVNDB-2014-005765 // CNNVD: CNNVD-201412-058 // NVD: CVE-2014-9238

PROBLEMTYPE DATA

problemtype:CWE-22

Trust: 1.9

sources: VULHUB: VHN-77183 // JVNDB: JVNDB-2014-005765 // NVD: CVE-2014-9238

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-058

TYPE

path traversal

Trust: 0.6

sources: CNNVD: CNNVD-201412-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-005765

PATCH

title:DCS-2103url:http://www.dlink.ru/mn/products/1433/1453.html

Trust: 0.8

sources: JVNDB: JVNDB-2014-005765

EXTERNAL IDS

db:NVDid:CVE-2014-9238

Trust: 3.5

db:PACKETSTORMid:129138

Trust: 2.6

db:BIDid:71484

Trust: 2.0

db:JVNDBid:JVNDB-2014-005765

Trust: 0.8

db:CNNVDid:CNNVD-201412-058

Trust: 0.7

db:CNVDid:CNVD-2014-08785

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

db:VULHUBid:VHN-77183

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08785 // VULHUB: VHN-77183 // BID: 71484 // JVNDB: JVNDB-2014-005765 // PACKETSTORM: 129138 // CNNVD: CNNVD-201412-058 // NVD: CVE-2014-9238

REFERENCES

url:http://packetstormsecurity.com/files/129138/d-link-dcs-2103-directory-traversal.html

Trust: 2.5

url:http://seclists.org/fulldisclosure/2014/nov/42

Trust: 2.0

url:http://websecurity.com.ua/7250/

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9238

Trust: 1.4

url:http://www.securityfocus.com/bid/71484

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9238

Trust: 0.8

url:http://www.dlink.com/

Trust: 0.3

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

url:http://www.youtube.com/playlist?list=plk7ns9smadnj7fwaqjgkbkqdcgtkafi9q.

Trust: 0.1

url:http://websecurity.com.ua

Trust: 0.1

url:http://websecurity.com.ua/7250/).

Trust: 0.1

url:http://site/cgi-bin/sddownload.cgi?file=/

Trust: 0.1

url:http://site/cgi-bin/sddownload.cgi?file=/../../etc/passwd

Trust: 0.1

url:http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2014-october/009056.html).

Trust: 0.1

sources: OTHER: None // CNVD: CNVD-2014-08785 // VULHUB: VHN-77183 // BID: 71484 // JVNDB: JVNDB-2014-005765 // PACKETSTORM: 129138 // CNNVD: CNNVD-201412-058 // NVD: CVE-2014-9238

CREDITS

MustLive

Trust: 0.4

sources: BID: 71484 // PACKETSTORM: 129138

SOURCES

db:OTHERid: -
db:CNVDid:CNVD-2014-08785
db:VULHUBid:VHN-77183
db:BIDid:71484
db:JVNDBid:JVNDB-2014-005765
db:PACKETSTORMid:129138
db:CNNVDid:CNNVD-201412-058
db:NVDid:CVE-2014-9238

LAST UPDATE DATE

2025-04-13T19:36:35.349000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-08785date:2014-12-09T00:00:00
db:VULHUBid:VHN-77183date:2017-09-09T00:00:00
db:BIDid:71484date:2017-09-07T13:13:00
db:JVNDBid:JVNDB-2014-005765date:2014-12-05T00:00:00
db:CNNVDid:CNNVD-201412-058date:2014-12-04T00:00:00
db:NVDid:CVE-2014-9238date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-08785date:2014-12-09T00:00:00
db:VULHUBid:VHN-77183date:2014-12-03T00:00:00
db:BIDid:71484date:2014-11-16T00:00:00
db:JVNDBid:JVNDB-2014-005765date:2014-12-05T00:00:00
db:PACKETSTORMid:129138date:2014-11-16T23:02:22
db:CNNVDid:CNNVD-201412-058date:2014-12-04T00:00:00
db:NVDid:CVE-2014-9238date:2014-12-03T21:59:08.057