Vulnerability Name: | CVE-2016-6255 (CCN-118242) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-07-18 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2016-07-18 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-11-03 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-284 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-6255 Source: CCN Type: SourceForge libupnp Project Portable SDK for UPnP Devices (libupnp 1.6.20 Source: DEBIAN Type: Third Party Advisory DSA-3736 Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20160718 libupnp write files via POST Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20160720 Re: libupnp write files via POST Source: BID Type: Third Party Advisory, VDB Entry 92050 Source: CCN Type: BID-92050 libupnp CVE-2016-6255 Arbitrary File Write Vulnerability Source: XF Type: UNKNOWN libupnp-cve20166255-sec-bypass(118242) Source: MISC Type: Issue Tracking, Patch, Third Party Advisory https://github.com/mjg59/pupnp-code/commit/be0a01bdb83395d9f3a5ea09c1308a4f1a972cbd Source: CCN Type: Packet Storm Security [10-21-2016] MiCasa VeraLite Remote Code Execution Source: GENTOO Type: UNKNOWN GLSA-201701-52 Source: CONFIRM Type: Release Notes, Third Party Advisory https://sourceforge.net/p/pupnp/code/ci/master/tree/ChangeLog Source: MISC Type: Third Party Advisory https://twitter.com/mjg59/status/755062278513319936 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [10-20-2016] Source: EXPLOIT-DB Type: UNKNOWN 40589 Source: MISC Type: UNKNOWN https://www.tenable.com/security/research/tra-2017-10 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |