CVE-2017-9382 Information

Share on:

Description

An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url \/port_3480. It seems that the UPnP services provide \file\ as one of the service actions for a normal user to read a file that is stored under the /etc/cmh-lu folder. It retrieves the value from the \parameters\ query string variable and then passes it to an internal function \FileUtils::ReadFileIntoBuffer\ which is a library function that does not perform any sanitization on the value submitted and this allows an attacker to use directory traversal characters ../\ and read files from other folders within the device.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Reference

http://packetstormsecurity.com/files/153242/Veralite-Veraedge-Router-XSS-Command-Injection-CSRF-Traversal.html https://github.com/ethanhunnt/IoT_vulnerabilities/blob/master/Vera_sec_issues.pdf https://seclists.org/bugtraq/2019/Jun/8 An issue was discovered on Vera VeraEdge 1.7.19 and Veralite 1.7.481 devices. The device provides UPnP services that are available on port 3480 and can also be accessed via port 80 using the url \/port_3480. It seems that the UPnP services provide \file
as one of the service actions for a normal user to read a file that is stored under the /etc/cmh-lu folder. It retrieves the value from the \parameters
query string variable and then passes it to an internal function \FileUtils::ReadFileIntoBuffer
which is a library function that does not perform any sanitization on the value submitted and this allows an attacker to use directory traversal characters ../
and read files from other folders within the device.

Attack Complexity

LOW

Privileges Required

LOW

User Interaction Required

LOW

Scope

NONE

Confidentiality Impact

UNCHANGED

Integrity Impact

HIGH

Availability Impact

NONE

Base Score

NONE

Base Severity

6.5