vendor:
WD Arkeia Virtual Appliance (AVA)
by:
M. Lucinskij, SEC Consult Vulnerability Lab
9
CVSS
CRITICAL
Path Traversal
22
CWE
Product Name: WD Arkeia Virtual Appliance (AVA)
Affected Version From: All Arkeia Network Backup releases (ASA/APA/AVA) since 7.0.3.
Affected Version To: 10.2.9
Patch Exists: YES
Related CWE: CVE-2014-2846
CPE: a:arkeia:arkeia_network_backup
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2014
Path Traversal/Remote Code Execution
The WD Arkeia virtual appliance is affected by a path traversal vulnerability. Path traversal enables attackers access to files and directories outside the web root through relative file paths in the user input. An unauthenticated remote attacker can exploit the vulnerability to gain unauthorized access to the WD Arkeia virtual appliance and stored backup data. The vulnerability is caused by insufficient input validation of the "fileName" parameter in the "download.php" script.
Mitigation:
Restrict access to the web interface of the WD Arkeia virtual appliance using a firewall until a comprehensive security audit based on a security source code review has been performed and all identified security deficiencies have been resolved by the affected vendor.