FKIE_CVE-2017-17223
Vulnerability from fkie_nvd - Published: 2018-03-09 17:29 - Updated: 2024-11-21 03:17
Severity ?
Summary
Huawei eSpace 7910 V200R003C30; eSpace 7950 V200R003C30; eSpace 8950 V200R003C00; V200R003C30 have a directory traversal vulnerability. An authenticated, remote attacker can craft specific URL to the affected products. Due to insufficient verification of the URL, successful exploit will upload and download files and cause information leak and system crash.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| huawei | espace_7910_firmware | v200r003c30 | |
| huawei | espace_7910 | - | |
| huawei | espace_7950_firmware | v200r003c30 | |
| huawei | espace_7950 | - | |
| huawei | espace_8950_firmware | v200r003c00 | |
| huawei | espace_8950_firmware | v200r003c30 | |
| huawei | espace_8950 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_7910_firmware:v200r003c30:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD48657-22D4-4CAD-88DB-F60A2964CABF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_7910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC59BBCD-9CBC-4D16-AB67-5C28FE9CFAF2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_7950_firmware:v200r003c30:*:*:*:*:*:*:*",
"matchCriteriaId": "4523A712-FF77-4BDA-B213-0AE2BDC4152C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_7950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185783AE-3135-471E-8D55-4BAB3A187F21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:huawei:espace_8950_firmware:v200r003c00:*:*:*:*:*:*:*",
"matchCriteriaId": "72548F60-D6B8-4498-8668-9074A706C3A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:huawei:espace_8950_firmware:v200r003c30:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0B1E39-ACEB-44FB-BDDE-F3856CF6137A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:huawei:espace_8950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8BFC4FD-DC7A-47E9-BC06-86F11E2211AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Huawei eSpace 7910 V200R003C30; eSpace 7950 V200R003C30; eSpace 8950 V200R003C00; V200R003C30 have a directory traversal vulnerability. An authenticated, remote attacker can craft specific URL to the affected products. Due to insufficient verification of the URL, successful exploit will upload and download files and cause information leak and system crash."
},
{
"lang": "es",
"value": "Huawei eSpace 7910 V200R003C30; eSpace 7950 V200R003C30 y eSpace 8950 V200R003C00 y V200R003C30 tienen una vulnerabilidad de salto de directorio. Un atacante remoto autenticado podr\u00eda manipular un archivo URL espec\u00edficas en los productos afectados. Dada la validaci\u00f3n insuficiente de la URL, un exploit con \u00e9xito cargar\u00e1 y descargar\u00e1 archivos y provocar\u00e1 un filtrado de informaci\u00f3n y el cierre inesperado del sistema."
}
],
"id": "CVE-2017-17223",
"lastModified": "2024-11-21T03:17:41.670",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 8.5,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-03-09T17:29:01.347",
"references": [
{
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-02-espace-en"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/2018/huawei-sa-20180131-02-espace-en"
}
],
"sourceIdentifier": "psirt@huawei.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…