Lucene search

K

avm-traversal.txt

🗓️ 20 Jan 2007 00:00:00Reported by H. WiedemannType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 41 Views

The "AVM IGD CTRL Service" in "Fritz!DSL Software 02.02.29" allows unauthorized access to system files and LAN computers via UPNP. Disable the service to mitigate risk

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`- Description  
The "AVM IGD CTRL Service", a Universal Plug and Play (UPNP) service for  
windows, which is part of the software package "Fritz!DSL Software  
02.02.29" provides the possibility to read any file on the windows  
system partition for any user - no matter how much restricted rights the  
user has.  
It is even possible to read files from any LAN computer on which this  
service is running and it is possible to read critical system files (SAM  
DB copies, profile files of any user) because the service is running  
under the (locally) most privileged system account.  
  
The mentioned software package is shipped with VOIP routers from the  
german company AVM (www.avm.de).  
  
  
- Reproduction  
Relative URLs for the AR7 webserver (which is part of the mentioned UPNP  
service) can be used to read files on the system partition. Because  
backslashes can't be directly used in a URL "%5C" has to be used.  
  
Examples for local and remote files of LAN computers:  
http://localhost:49001/..%5C..%5C..%5Cwindows%5Csystem.ini  
http://192.168.178.20:49001/..%5C..%5C..%5Cwindows%5Csystem.ini  
  
  
- Workaround  
Disable the "AVM IGD CTRL Service" under the services control panel.  
  
  
Regards,  
  
--   
  
DPR  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo