search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Mutiny Appliance contains multiple directory traversal vulnerabilities

Vulnerability Note VU#701572

Original Release Date: 2013-05-15 | Last Revised: 2013-05-15

Overview

Mutiny appliance contains multiple directory traversal (CWE-22) vulnerabilities.

Description

The Mutiny appliance commands for UPLOAD, DELETE, CUT and COPY are all vulnerable to directory traversal attacks. Additional details may be found in the Rapid7 blog post entitled, "New 1day Exploits: Mutiny Vulnerabilities".

Impact

An authenticated remote attacker may be able to upload, delete, and move files on the system with root privileges.

Solution

Apply an Update

Mutiny appliance version "5.0-1.11 (EAGLe) - (02-05-13)" has been released to address these vulnerabilities.

Restrict Network Access

As a general good security practice, only allow connections from trusted hosts and networks. Restricting access would prevent an attacker from connecting to the service from a blocked network location.

Vendor Information

701572
 

CVSS Metrics

Group Score Vector
Base 7.9 AV:N/AC:M/Au:S/C:C/I:C/A:N
Temporal 6.9 E:ND/RL:OF/RC:C
Environmental 5.2 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Juan Vazquez for discovering and Tod Beardsley for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2013-0136
Date Public: 2013-05-15
Date First Published: 2013-05-15
Date Last Updated: 2013-05-15 17:20 UTC
Document Revision: 19

Sponsored by CISA.