var-200610-0509
Vulnerability from variot
Cross-site request forgery (CSRF) vulnerability in the administrative interface for the TeraStation HD-HTGL firmware 2.05 beta 1 and earlier allows remote attackers to modify configurations or delete arbitrary data via unspecified vectors. TeraStation HD-HTGL series provided by Buffalo, Inc. are hard disks for LAN connection and have administrative web interface.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: TeraStation HD-HTGL Series Cross-Site Request Forgery
SECUNIA ADVISORY ID: SA22248
VERIFY ADVISORY: http://secunia.com/advisories/22248/
CRITICAL: Less critical
IMPACT: Cross Site Scripting, Manipulation of data
WHERE:
From remote
OPERATING SYSTEM: TeraStation HD-HTGL Series http://secunia.com/product/12189/
DESCRIPTION: A vulnerability has been reported in TeraStation HD-HTGL Series, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The vulnerability is caused due to an error within the web administration interface, which allows to perform certain sensitive actions without verifying the user's request. This can be exploited to modify certain configuration sections or delete data stored on the device.
The vulnerability is reported in firmware 2.05. Other versions may also be affected.
SOLUTION: Do not visit untrusted sites while being logged in to the device.
PROVIDED AND/OR DISCOVERED BY: Reported by JVN.
ORIGINAL ADVISORY: http://jvn.jp/jp/JVN%2393484133/index.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200610-0509",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "terastation hd-htgl",
"scope": "eq",
"trust": 1.6,
"vendor": "buffalotech",
"version": "2.05_beta1"
},
{
"model": "hd-htgl series",
"scope": "lte",
"trust": 0.8,
"vendor": "buffalo",
"version": "firmware ver. 2.05-beta-1"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:buffalo_inc:terastation_hd-htgl_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Secunia",
"sources": [
{
"db": "PACKETSTORM",
"id": "50493"
}
],
"trust": 0.1
},
"cve": "CVE-2006-5175",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "CVE-2006-5175",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 7.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2006-000665",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "VHN-21283",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2006-5175",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2006-000665",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200610-169",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-21283",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cross-site request forgery (CSRF) vulnerability in the administrative interface for the TeraStation HD-HTGL firmware 2.05 beta 1 and earlier allows remote attackers to modify configurations or delete arbitrary data via unspecified vectors. TeraStation HD-HTGL series provided by Buffalo, Inc. are hard disks for LAN connection and have administrative web interface. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nTeraStation HD-HTGL Series Cross-Site Request Forgery\n\nSECUNIA ADVISORY ID:\nSA22248\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/22248/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nCross Site Scripting, Manipulation of data\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nTeraStation HD-HTGL Series\nhttp://secunia.com/product/12189/\n\nDESCRIPTION:\nA vulnerability has been reported in TeraStation HD-HTGL Series,\nwhich can be exploited by malicious people to conduct cross-site\nrequest forgery attacks. \n\nThe vulnerability is caused due to an error within the web\nadministration interface, which allows to perform certain sensitive\nactions without verifying the user\u0027s request. This can be exploited\nto modify certain configuration sections or delete data stored on the\ndevice. \n\nThe vulnerability is reported in firmware 2.05. Other versions may\nalso be affected. \n\nSOLUTION:\nDo not visit untrusted sites while being logged in to the device. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by JVN. \n\nORIGINAL ADVISORY:\nhttp://jvn.jp/jp/JVN%2393484133/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-5175"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "PACKETSTORM",
"id": "50493"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "SECUNIA",
"id": "22248",
"trust": 2.6
},
{
"db": "NVD",
"id": "CVE-2006-5175",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2006-3891",
"trust": 1.7
},
{
"db": "XF",
"id": "29338",
"trust": 1.4
},
{
"db": "JVN",
"id": "JVN93484133",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#93484133",
"trust": 0.6
},
{
"db": "BID",
"id": "84566",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-21283",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "50493",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "PACKETSTORM",
"id": "50493"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"id": "VAR-200610-0509",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-21283"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T22:15:11.041000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Download Service",
"trust": 0.8,
"url": "http://buffalo.jp/download/driver/hd/hd-htgl.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://jvn.jp/jp/jvn%2393484133/index.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/22248"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2006/3891"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/29338"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/3891"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29338"
},
{
"trust": 0.9,
"url": "http://secunia.com/advisories/22248/"
},
{
"trust": 0.8,
"url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5175"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn93484133/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-5175"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/12189/"
},
{
"trust": 0.1,
"url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "PACKETSTORM",
"id": "50493"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-21283"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"db": "PACKETSTORM",
"id": "50493"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-21283"
},
{
"date": "2008-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"date": "2006-10-03T22:17:11",
"db": "PACKETSTORM",
"id": "50493"
},
{
"date": "2006-10-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"date": "2006-10-10T04:06:00",
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-20T00:00:00",
"db": "VULHUB",
"id": "VHN-21283"
},
{
"date": "2008-05-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-000665"
},
{
"date": "2006-10-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200610-169"
},
{
"date": "2024-11-21T00:18:10.470000",
"db": "NVD",
"id": "CVE-2006-5175"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "TeraStation HD-HTGL series cross-site request forgery vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-000665"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200610-169"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.