ID CVE-2021-40870
Summary An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
References
Vulnerable Configurations
  • cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:*
    cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 08-08-2023 - 14:21)
Impact:
Exploitability:
CWE CWE-23
CAPEC
  • Manipulating Web Input to File System Calls
    An attacker manipulates inputs to the target software which the target software passes to file system calls in the OS. The goal is to gain access to, and perhaps modify, areas of the file system that the target software did not intend to be accessible.
  • Relative Path Traversal
    An attacker exploits a weakness in input validation on the target by supplying a specially constructed path utilizing dot and slash characters for the purpose of obtaining access to arbitrary files or resources. An attacker modifies a known path on the target in order to reach material that is not available through intended channels. These attacks normally involve adding additional path separators (/ or \) and/or dots (.), or encodings thereof, in various combinations in order to reach parent directories or entirely separate trees of the target's directory structure.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
Last major update 08-08-2023 - 14:21
Published 13-09-2021 - 08:15
Last modified 08-08-2023 - 14:21
Back to Top