Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-22gf-2q7p-998g

Опубликовано: 09 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 4.3

Описание

An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.

An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.

EPSS

Процентиль: 41%
0.00194
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 4.3
nvd
около 2 месяцев назад

An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.

EPSS

Процентиль: 41%
0.00194
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-22