Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-22440

Опубликовано: 13 июл. 2021
Источник: nvd
CVSS3: 4.6
CVSS2: 2.1
EPSS Низкий

Описание

There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1).

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:huawei:mate_20_firmware:9.0.0.195\(c01e195r2p1\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_firmware:9.1.0.139\(c00e133r3p1\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

Одно из

cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.187\(c432e10r1p16\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.188\(c185e10r2p1\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.245\(c10e10r2p1\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.266\(c432e10r1p16\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.267\(c636e10r2p1\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.268\(c635e12r1p16\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:mate_20_pro_firmware:9.0.0.278\(c185e10r2p1\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

Одно из

cpe:2.3:o:huawei:hima-l29c_firmware:9.0.0.105\(c10e9r1p16\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:hima-l29c_firmware:9.0.0.105\(c185e9r1p16\):*:*:*:*:*:*:*
cpe:2.3:o:huawei:hima-l29c_firmware:9.0.0.105\(c636e9r1p16\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:hima-l29c:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:huawei:laya-al00ep_firmware:9.1.0.139\(c786e133r3p1\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:laya-al00ep:-:*:*:*:*:*:*:*
Конфигурация 5

Одновременно

cpe:2.3:o:huawei:oxfords-an00a_firmware:10.1.0.223\(c00e210r5p1\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:oxfords-an00a:-:*:*:*:*:*:*:*
Конфигурация 6

Одновременно

cpe:2.3:o:huawei:tony-al00b_firmware:9.1.0.257\(c00e222r2p1\):*:*:*:*:*:*:*
cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*

EPSS

Процентиль: 7%
0.00026
Низкий

4.6 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

There is a path traversal vulnerability in some Huawei products. The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename. Affected product versions include:HUAWEI Mate 20 9.0.0.195(C01E195R2P1), 9.1.0.139(C00E133R3P1);HUAWEI Mate 20 Pro 9.0.0.187(C432E10R1P16), 9.0.0.188(C185E10R2P1), 9.0.0.245(C10E10R2P1), 9.0.0.266(C432E10R1P16), 9.0.0.267(C636E10R2P1), 9.0.0.268(C635E12R1P16), 9.0.0.278(C185E10R2P1); Hima-L29C 9.0.0.105(C10E9R1P16), 9.0.0.105(C185E9R1P16), 9.0.0.105(C636E9R1P16); Laya-AL00EP 9.1.0.139(C786E133R3P1); OxfordS-AN00A 10.1.0.223(C00E210R5P1); Tony-AL00B 9.1.0.257(C00E222R2P1).

EPSS

Процентиль: 7%
0.00026
Низкий

4.6 Medium

CVSS3

2.1 Low

CVSS2

Дефекты

CWE-22