vendor:
KEN!
by:
SecurityFocus
7.5
CVSS
HIGH
Remote File Retrieval and Denial of Service
20
CWE
Product Name: KEN!
Affected Version From: 01.03.10
Affected Version To: 01.03.10
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002
AVM KEN! Remote File Retrieval and Denial of Service Vulnerability
A remote user on the local network is capable of retrieving any known file from a machine running AVM KEN! by appending ../ to a URL utilizing port 3128 to escape the regular web file structure, and appending the remaining path onto the request. A denial of service attack could also be launched against AVM KEN! by sending random characters to port 3128. A restart would be required in order to regain normal functionality.
Mitigation:
Restrict access to port 3128 and ensure that the latest version of AVM KEN! is installed.