search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mutiny Appliance contains multiple directory traversal vulnerabilities

Vulnerability Note VU#701572

Original Release Date: 2013-05-15 | Last Revised: 2013-05-15

Overview

Mutiny appliance contains multiple directory traversal (CWE-22) vulnerabilities.

Description

The Mutiny appliance commands for UPLOAD, DELETE, CUT and COPY are all vulnerable to directory traversal attacks. Additional details may be found in the Rapid7 blog post entitled, "New 1day Exploits: Mutiny Vulnerabilities".

Impact

An authenticated remote attacker may be able to upload, delete, and move files on the system with root privileges.

Solution

Apply an Update

Mutiny appliance version "5.0-1.11 (EAGLe) - (02-05-13)" has been released to address these vulnerabilities.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information

701572
 

Mutiny Technologies Affected

Notified:  April 19, 2013 Updated: May 15, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 7.9 AV:N/AC:M/Au:S/C:C/I:C/A:N
Temporal 6.9 E:ND/RL:OF/RC:C
Environmental 5.2 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Juan Vazquez for discovering and Tod Beardsley for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2013-0136
Date Public: 2013-05-15
Date First Published: 2013-05-15
Date Last Updated: 2013-05-15 17:20 UTC
Document Revision: 19

Sponsored by CISA.