lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <d4efcf3d-741f-ab4c-0748-ce7d32141058@securify.nl> Date: Thu, 19 Apr 2018 19:28:21 +0200 From: Summer of Pwnage via Fulldisclosure <fulldisclosure@...lists.org> To: fulldisclosure@...lists.org Subject: [FD] Seagate Media Server path traversal vulnerability ------------------------------------------------------------------------ Seagate Media Server path traversal vulnerability ------------------------------------------------------------------------ Yorick Koster, September 2017 ------------------------------------------------------------------------ Abstract ------------------------------------------------------------------------ Seagate Personal Cloud is a consumer-grade Network-Attached Storage device (NAS). It was found that Seagate Media Server is vulnerable to path traversal that allows unauthenticated attackers to download arbitrary files from the NAS. Since Seagate Media Server runs with root privileges it is possible to exploit this issue to retrieve sensitive information from the NAS. ------------------------------------------------------------------------ Tested versions ------------------------------------------------------------------------ This issue was tested on a Seagate Personal Cloud model SRN21C running firmware versions 4.3.16.0 and 4.3.18.0. It is likely that other devices/models are also affected. ------------------------------------------------------------------------ Fix ------------------------------------------------------------------------ This issue has been fixed in firmware version 4.3.18.4. ------------------------------------------------------------------------ Details ------------------------------------------------------------------------ https://sumofpwn.nl/advisory/2017/seagate-media-server-path-traversal-vulnerability.html _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists