Overview
Netgear Management System NMS300, version 1.5.0.11 and earlier, is vulnerable to arbitrary file upload, which may be leveraged by unauthenticated users to execute arbitrary code with SYSTEM privileges. A directory traversal vulnerability enables authenticated users to download arbitrary files.
Description
Netgear Management System NMS300 is a configuration, monitoring, and diagnostics utility for managing SNMP networked devices via a web interface. CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2016-1524 |
Impact
An unauthenticated attacker on the network can upload arbitrary files to the server's root web directory, leading to data creation and arbitrary code execution with SYSTEM privileges. An authenticated attacker on the network can access any file on the server host. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem and recommends the following workaround. |
Restrict access |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 8.3 | AV:A/AC:L/Au:N/C:C/I:C/A:C |
Temporal | 7.5 | E:POC/RL:U/RC:C |
Environmental | 5.6 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Pedro Ribeiro (pedrib@gmail.com) of Agile Information Security for reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2016-1524, CVE-2016-1525 |
Date Public: | 2016-02-03 |
Date First Published: | 2016-02-03 |
Date Last Updated: | 2016-02-04 17:43 UTC |
Document Revision: | 22 |