| Vulnerability Name: | CVE-2013-2751 (CCN-88205) | ||||||||
| Assigned: | 2013-10-22 | ||||||||
| Published: | 2013-10-22 | ||||||||
| Updated: | 2019-07-18 | ||||||||
| Summary: | Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow." | ||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
3.6 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-94 | ||||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||||
| References: | Source: CCN Type: BugTraq Mailing List, Tue Oct 22 2013 - 08:33:35 CDT [CVE-2013-2751, CVE-2013-2752] NETGEAR ReadyNAS Remote Root Source: MITRE Type: CNA CVE-2013-2751 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 29815 Source: OSVDB Type: Broken Link 98826 Source: CCN Type: NetGear ReadyNAS Web Site NetGear ReadyNAS Source: CCN Type: NetGear ReadyNAS RAIDiator 4.1.x Download Web Site NetGear ReadyNAS RAIDiator 4.1.x Download Source: CCN Type: NetGear ReadyNAS RAIDiator 4.2.x Download Web Site NetGear ReadyNAS RAIDiator 4.2.x Download Source: MISC Type: Patch, Vendor Advisory http://www.readynas.com/?p=7002 Source: CCN Type: BID-62059 NetGear RAIDiator Cross Site Request Forgery and Command Injection Vulnerabilities Source: CCN Type: Tripwire Web Site Security Advisory: NETGEAR ReadyNAS Source: MISC Type: Third Party Advisory http://www.tripwire.com/register/security-advisory-netgear-readynas/ Source: CCN Type: Tripwire The State of Security Web Site ReadyNAS Flaw Allows Root Access from Unauthenticated HTTP Request Source: MISC Type: Third Party Advisory http://www.tripwire.com/state-of-security/vulnerability-management/readynas-flaw-allows-root-access-unauthenticated-http-request/ Source: XF Type: UNKNOWN netgear-readynas-cve20132751-csrf(88205) Source: CCN Type: Packet Storm Security [11-25-2013] NETGEAR ReadyNAS Perl Code Evaluation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [11-25-2013] | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||