Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-17662
HistoryJan 10, 2018 - 6:29 p.m.

Directory traversal

2018-01-1018:29:00
PRIOn knowledge base
www.prio-n.com
6

7.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.0%

Directory traversal in the HTTP server on Yawcam 0.2.6 through 0.6.0 devices allows attackers to read arbitrary files through a sequence of the form ‘.x./’ or ‘…\x/’ where x is a pattern composed of one or more (zero or more for the second pattern) of either \ or …\ – for example a ‘../’, ‘…/’ or ‘…./’ sequence. For files with no extension, a single dot needs to be appended to ensure the HTTP server does not alter the request, e.g., a “GET /../../../../../../../windows/system32/drivers/etc/hosts.” request.

CPENameOperatorVersion
yawcamge0.2.6
yawcamle0.6.0

7.6 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.0%

Related for PRION:CVE-2017-17662