HTTP: Netgear ProSAFE NMS300 Directory Traversal

This signature detects an attempt to exploit a known vulnerability against Netgear ProSAFE NMS300. Successful exploitation could allow an attacker to upload arbitrary files which could lead to further attacks.

Extended Description

This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122.

Affected Products

Netgear prosafe_network_management_system

Short Name
HTTP:CTS:NG-NMS300-DIRTRAV
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2021-27276 CVE-2024-5505 Directory NMS300 Netgear ProSAFE Traversal
Release Date
06/23/2021
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3739
False Positive
Unknown
Vendors

Netgear

CVSS Score

5.5

Found a potential security threat?