Описание
The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.
Ссылки
- Exploit
- US Government Resource
- Exploit
- Exploit
- US Government Resource
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:s2sys:netbox:2.5:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:3.3:*:*:*:*:*:*:*
cpe:2.3:h:s2sys:netbox:4.0:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:h:linearcorp:emerge_50:*:*:*:*:*:*:*:*
cpe:2.3:h:linearcorp:emerge_5000:*:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:h:sonitrol:eaccess:*:*:*:*:*:*:*:*
EPSS
Процентиль: 84%
0.02084
Низкий
5 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
The S2 Security NetBox 2.5, 3.3, and 4.0, as used in the Linear eMerge 50 and 5000 and the Sonitrol eAccess, stores sensitive information under the web root with insufficient access control, which allows remote attackers to download node logs, photographs of persons, and backup files via unspecified HTTP requests.
EPSS
Процентиль: 84%
0.02084
Низкий
5 Medium
CVSS2
Дефекты
CWE-264