Description
ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
Affected Software
Related
{"id": "CVE-2021-3019", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2021-3019", "description": "ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.", "published": "2021-01-05T05:15:00", "modified": "2021-01-07T19:56:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0}, "severity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3019", "reporter": "cve@mitre.org", "references": ["https://github.com/ffay/lanproxy/commits/master", "https://github.com/maybe-why-not/lanproxy/issues/1"], "cvelist": ["CVE-2021-3019"], "immutableFields": [], "lastseen": "2022-03-23T17:21:55", "viewCount": 95, "enchantments": {"dependencies": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2021-0045"]}, {"type": "githubexploit", "idList": ["112AB37C-0154-5CC4-9F77-E4ADB99A54BD", "36E1126B-5E60-5472-9089-DF35854B215A", "4D38B95D-AF9F-53D5-8E5C-2B0E3F4E4882", "CC0FEC24-A400-5A01-9991-0ECFC0CF9846", "E4BB7E6B-BD70-552C-8930-30C2DC4B2C67"]}], "rev": 4}, "score": {"value": 4.1, "vector": "NONE"}, "twitter": {"counter": 5, "modified": "2021-02-02T07:55:04", "tweets": [{"link": "https://twitter.com/www_sesin_at/status/1347299615993954305", "text": "New post from https://t.co/9KYxtdZjkl?amp=1 (CVE-2021-3019 (lanproxy)) has been published on https://t.co/hpPDfAUJrW?amp=1"}, {"link": "https://twitter.com/WolfgangSesin/status/1347299628623007745", "text": "New post from https://t.co/uXvPWJy6tj?amp=1 (CVE-2021-3019 (lanproxy)) has been published on https://t.co/IWDO1oKGXz?amp=1"}, {"link": "https://twitter.com/VulmonFeeds/status/1382185843419414529", "text": "CVE-2021-3019\n\nffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.prop...\n\nhttps://t.co/3fah1jF20z?amp=1\n\nVulnerability Notification: https://t.co/xhLrNnfyrO?amp=1"}, {"link": "https://twitter.com/akaclandestine/status/1382615192777940992", "text": "/hashtag/exploit?src=hashtag_click\nCVE-2021-3019:\nffay lanproxy 0.1 (firewall software) - pathname traversal\nExploit 1:\nhttps://t.co/gLV6A2akoJ?amp=1\nExploit 2:\nhttps://t.co/9h7nmVEKcR?amp=1"}, {"link": "https://twitter.com/goby77463399/status/1349193739420397569", "text": "New vulnerability: lanproxy Directory Traversal (CVE-2021-3019)\n(Next Version update) \n\nMore Vulnerabilities, https://t.co/wkYqnKfdCJ?amp=1\nProvide Feedback, https://t.co/A9JYTBB3kh?amp=1\nJoin Telegram: https://t.co/uI4YmQCarn?amp=1"}]}, "backreferences": {"references": [{"type": "checkpoint_advisories", "idList": ["CPAI-2021-0045"]}, {"type": "githubexploit", "idList": ["112AB37C-0154-5CC4-9F77-E4ADB99A54BD", "36E1126B-5E60-5472-9089-DF35854B215A", "4D38B95D-AF9F-53D5-8E5C-2B0E3F4E4882", "CC0FEC24-A400-5A01-9991-0ECFC0CF9846", "E4BB7E6B-BD70-552C-8930-30C2DC4B2C67"]}]}, "exploitation": null, "vulnersScore": 4.1}, "_state": {"dependencies": 0}, "_internal": {}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": ["cpe:/a:lanproxy_project:lanproxy:0.1"], "cpe23": ["cpe:2.3:a:lanproxy_project:lanproxy:0.1:*:*:*:*:*:*:*"], "cwe": ["CWE-22"], "affectedSoftware": [{"cpeName": "lanproxy_project:lanproxy", "version": "0.1", "operator": "eq", "name": "lanproxy project lanproxy"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:lanproxy_project:lanproxy:0.1:*:*:*:*:*:*:*", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://github.com/ffay/lanproxy/commits/master", "name": "https://github.com/ffay/lanproxy/commits/master", "refsource": "MISC", "tags": ["Patch", "Third Party Advisory"]}, {"url": "https://github.com/maybe-why-not/lanproxy/issues/1", "name": "https://github.com/maybe-why-not/lanproxy/issues/1", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}]}
{"githubexploit": [{"lastseen": "2021-12-10T15:19:15", "description": "## \u4f7f\u7528\u65b9\u6cd5&\u514d\u8d23\u58f0\u660e\n\n lanproxy \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b (CVE-2021-3019...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2021-01-14T07:19:21", "type": "githubexploit", "title": "Exploit for Path Traversal in Lanproxy Project Lanproxy", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-3019"], "modified": "2021-11-25T06:50:40", "id": "CC0FEC24-A400-5A01-9991-0ECFC0CF9846", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "privateArea": 1}, {"lastseen": "2021-12-10T15:19:23", "description": "## \u4f7f\u7528\u65b9\u6cd5&\u514d\u8d23\u58f0\u660e\r\n\r\n lanproxy \u76ee\u5f55\u904d\u5386\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b (CVE-2...", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2021-01-09T07:11:38", "type": "githubexploit", "title": "Exploit for Path Traversal in Lanproxy Project Lanproxy", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-3019"], "modified": "2021-10-24T05:59:19", "id": "4D38B95D-AF9F-53D5-8E5C-2B0E3F4E4882", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "privateArea": 1}, {"lastseen": "2022-05-14T23:42:08", "description": "# CVE-2021-3019\nCVE-2021-3019 lanproxy\u76ee\u5f55\u904d\u5386\u4efb\u610f\u6587\u4ef6\u8bfb\u53d6\u6f0f\u6d1e\n\n", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-3019"], "modified": "2021-02-15T00:00:00", "id": "CPAI-2021-0045", "href": "", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}]}