HTTP: Netgear ProSAFE NMS300 Directory Traversal
This signature detects an attempt to exploit a known vulnerability against Netgear ProSAFE NMS300. Successful exploitation could allow an attacker to upload arbitrary files which could lead to further attacks.
Extended Description
This vulnerability allows remote attackers to delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the MibController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-12122.
Affected Products
Netgear prosafe_network_management_system
References
CVE: CVE-2024-5505
URL: https://kb.netgear.com/000062559/NMS300-Software-Release-1-6-0-27 https://kb.netgear.com/000062722/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0500 http://www.zerodayinitiative.com/advisories/ZDI-21-359/ https://kb.netgear.com/000066192/Security-Advisory-for-Missing-Function-Level-Access-Control-on-the-NMS300-PSV-2024-0008 http://www.zerodayinitiative.com/advisories/ZDI-24-563/
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Netgear
5.5