ID

VAR-201706-0505


CVE

CVE-2017-2850


TITLE

Foscam C1 Indoor HD Camera Web In the management interface HTTP Request smuggling vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-005154

DESCRIPTION

In the web management interface in Foscam C1 Indoor HD cameras with application firmware 2.52.2.37, a specially crafted HTTP request can allow for a user to inject arbitrary characters in the pureftpd.passwd file during a username change, which in turn allows for bypassing chroot restrictions in the FTP server. An attacker can simply send an HTTP request to the device to trigger this vulnerability. FoscamC1IndoorHDCamera is a wireless HD IP camera from China Foscam. A security vulnerability exists in the web management interface in FoscamC1IndoorHDCamera using version 2.52.2.37 of the application firmware. Foscam IP Video Camera is prone to multiple command-injection vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary commands in context of the affected device

Trust: 2.61

sources: NVD: CVE-2017-2850 // JVNDB: JVNDB-2017-005154 // CNVD: CNVD-2017-14065 // BID: 99184 // VULHUB: VHN-111053 // VULMON: CVE-2017-2850

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-14065

AFFECTED PRODUCTS

vendor:foscammodel:c1 indoor hd camerascope:eqversion:2.52.2.37

Trust: 2.4

vendor:foscammodel:c1 indoor hd camerasscope:lteversion:<=2.52.2.37

Trust: 0.6

vendor:foscammodel:ip video camerascope:eqversion:1.9.3.17

Trust: 0.3

vendor:foscammodel:ip video camerascope:neversion:2.0.2.43

Trust: 0.3

sources: CNVD: CNVD-2017-14065 // BID: 99184 // JVNDB: JVNDB-2017-005154 // CNNVD: CNNVD-201706-1212 // NVD: CVE-2017-2850

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2850
value: HIGH

Trust: 1.0

talos-cna@cisco.com: CVE-2017-2850
value: HIGH

Trust: 1.0

NVD: CVE-2017-2850
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-14065
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201706-1212
value: HIGH

Trust: 0.6

VULHUB: VHN-111053
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-2850
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2850
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-14065
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-111053
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

talos-cna@cisco.com: CVE-2017-2850
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2017-2850
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2017-14065 // VULHUB: VHN-111053 // VULMON: CVE-2017-2850 // JVNDB: JVNDB-2017-005154 // CNNVD: CNNVD-201706-1212 // NVD: CVE-2017-2850 // NVD: CVE-2017-2850

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:CWE-444

Trust: 0.9

sources: VULHUB: VHN-111053 // JVNDB: JVNDB-2017-005154 // NVD: CVE-2017-2850

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201706-1212

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201706-1212

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-005154

PATCH

title:Top Pageurl:https://www.foscam.com/

Trust: 0.8

title:FoscamC1IndoorHDCameracgiproxy.fcgi changes the patch for the username pureftpd.passwd injection vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/97905

Trust: 0.6

title:Foscam C1 Indoor HD Camera Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71350

Trust: 0.6

sources: CNVD: CNVD-2017-14065 // JVNDB: JVNDB-2017-005154 // CNNVD: CNNVD-201706-1212

EXTERNAL IDS

db:NVDid:CVE-2017-2850

Trust: 3.5

db:TALOSid:TALOS-2017-0352

Trust: 3.2

db:BIDid:99184

Trust: 2.7

db:JVNDBid:JVNDB-2017-005154

Trust: 0.8

db:CNNVDid:CNNVD-201706-1212

Trust: 0.7

db:CNVDid:CNVD-2017-14065

Trust: 0.6

db:SEEBUGid:SSVID-96485

Trust: 0.1

db:VULHUBid:VHN-111053

Trust: 0.1

db:VULMONid:CVE-2017-2850

Trust: 0.1

sources: CNVD: CNVD-2017-14065 // VULHUB: VHN-111053 // VULMON: CVE-2017-2850 // BID: 99184 // JVNDB: JVNDB-2017-005154 // CNNVD: CNNVD-201706-1212 // NVD: CVE-2017-2850

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2017-0352

Trust: 2.4

url:http://www.securityfocus.com/bid/99184

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2850

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-2850

Trust: 0.8

url:https://www.talosintelligence.com/vulnerability_reports/talos-2017-0352

Trust: 0.8

url:http://www.foscam.com/

Trust: 0.3

url:http://blog.talosintelligence.com/2017/06/foscam-vuln-details.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/444.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://tools.cisco.com/security/center/viewalert.x?alertid=54236

Trust: 0.1

sources: CNVD: CNVD-2017-14065 // VULHUB: VHN-111053 // VULMON: CVE-2017-2850 // BID: 99184 // JVNDB: JVNDB-2017-005154 // CNNVD: CNNVD-201706-1212 // NVD: CVE-2017-2850

CREDITS

Cory Duplantis, Claudio Bozzato and another member of Cisco Talos.

Trust: 0.3

sources: BID: 99184

SOURCES

db:CNVDid:CNVD-2017-14065
db:VULHUBid:VHN-111053
db:VULMONid:CVE-2017-2850
db:BIDid:99184
db:JVNDBid:JVNDB-2017-005154
db:CNNVDid:CNNVD-201706-1212
db:NVDid:CVE-2017-2850

LAST UPDATE DATE

2025-04-20T22:56:07.496000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-14065date:2017-07-12T00:00:00
db:VULHUBid:VHN-111053date:2017-07-05T00:00:00
db:VULMONid:CVE-2017-2850date:2017-07-05T00:00:00
db:BIDid:99184date:2017-06-19T00:00:00
db:JVNDBid:JVNDB-2017-005154date:2017-07-19T00:00:00
db:CNNVDid:CNNVD-201706-1212date:2022-06-08T00:00:00
db:NVDid:CVE-2017-2850date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-14065date:2017-07-12T00:00:00
db:VULHUBid:VHN-111053date:2017-06-29T00:00:00
db:VULMONid:CVE-2017-2850date:2017-06-29T00:00:00
db:BIDid:99184date:2017-06-19T00:00:00
db:JVNDBid:JVNDB-2017-005154date:2017-07-19T00:00:00
db:CNNVDid:CNNVD-201706-1212date:2017-06-30T00:00:00
db:NVDid:CVE-2017-2850date:2017-06-29T17:29:00.367