Описание
The remote management interface on the Claymore Dual GPU miner 10.1 is vulnerable to an authenticated directory traversal vulnerability exploited by issuing a specially crafted request, allowing a remote attacker to read/write arbitrary files. This can be exploited via ../ sequences in the pathname to miner_file or miner_getfile.
Ссылки
- Mailing List
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- Mailing List
- Third Party Advisory
- ExploitThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:claymore_dual_miner_project:claymore_dual_miner:10.1:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.27143
Средний
8.1 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
The remote management interface on the Claymore Dual GPU miner 10.1 is vulnerable to an authenticated directory traversal vulnerability exploited by issuing a specially crafted request, allowing a remote attacker to read/write arbitrary files. This can be exploited via ../ sequences in the pathname to miner_file or miner_getfile.
EPSS
Процентиль: 96%
0.27143
Средний
8.1 High
CVSS3
8.5 High
CVSS2
Дефекты
CWE-22