header-logo
Suggest Exploit
vendor:
HomeSeer
by:
SecurityFocus
8.8
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: HomeSeer
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Keware Technologies HomeSeer Directory Traversal

HomeSeer is a home automation application which enables users to control various housewares and appliances locally or remotely via a web interface. It is possible for a remote user to gain access to any known file outside of the HomeSeer directory on the root directory by sending a specially crafted HTTP request comprised of '../' and the known filename. This could lead to a complete compromise of the host.

Mitigation:

Restrict access to the HomeSeer directory and ensure that all files outside of the HomeSeer directory are not accessible.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2085/info

Keware Technologies HomeSeer is a home automation application which enables users to control various housewares and appliances locally or remotely via a web interface.

It is possible for a remote user to gain access to any known file outside of the HomeSeer directory on the root directory. A specially crafted HTTP request comprised of '../' and the known filename, will display the contents of the particular file with read permissions.

Successful exploitation of this vulnerability could enable a remote user to gain access to systems files, password files, etc. This could lead to a complete compromise of the host. 

http://target/../../../filename.ext