1 results (0.003 seconds)

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 2

Directory traversal vulnerability in opt/arkeia/wui/htdocs/index.php in the WD Arkeia virtual appliance (AVA) with firmware before 10.2.9 allows remote attackers to read arbitrary files and execute arbitrary PHP code via a ..././ (dot dot dot slash dot slash) in the lang Cookie parameter, as demonstrated by a request to login/doLogin. Vulnerabilidad de salto de directorio en opt/arkeia/wui/htdocs/index.php en WD Arkeia Virtual Appliance (AVA) con firmware anterior a 10.2.9 permite a atacantes remotos leer archivos arbitrarios y ejecutar código PHP arbitrario a través de un ..././ (punto punto barra punto barra) en el parámetro lang Cookie, tal y como fue demostrado por una solicitud hacia login/doLogin. WD Arkeia Virtual Appliance versions 7.0.3 up to 10.2.8 suffer from directory traversal and remote command execution vulnerabilities. • https://www.exploit-db.com/exploits/33005 http://seclists.org/fulldisclosure/2014/Apr/257 http://wiki.arkeia.com/index.php/Path_Traversal_Remote_Code_Execution http://www.securityfocus.com/archive/1/531910/100/0/threaded • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •