vendor:
SnapGear Management Console SG560
by:
LiquidWorm
7.5
CVSS
HIGH
Arbitrary File Read/Write
N/A
CWE
Product Name: SnapGear Management Console SG560
Affected Version From: 3.1.5u1
Affected Version To: 3.1.5u1
Patch Exists: NO
Related CWE: N/A
CPE: a:secure_computing:snapgear_management_console_sg560
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: fnord/1.9, Apache 1.3.27 (Unix), Linux 2.4.31
2020
Secure Computing SnapGear Management Console SG560 3.1.5 – Arbitrary File Read
The application allows the currently logged-in user to edit the configuration files in the system using the CGI executable 'edit_config_files' in /cgi-bin/cgix/. The files that are allowed to be modified (read/write/delete) are located in the /etc/config/ directory. An attacker can manipulate the POST request parameters to escape from the restricted environment by using absolute path and start reading, writing and deleting arbitrary files on the system.
Mitigation:
Restrict access to the application and limit the privileges of the user to only the necessary ones.