var-201712-0862
Vulnerability from variot
An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device's file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root. Western Digital My Cloud PR4100 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Web administration component is one of the Web administration components. There is a security vulnerability in the web management component of Western Digital MyCloud PR4100 version 2.30.172
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201712-0862", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "my cloud pr4100", "scope": "eq", "trust": 1.0, "vendor": "westerndigital", "version": "2.30.172" }, { "model": "my cloud pr4100", "scope": "eq", "trust": 0.8, "vendor": "western digital", "version": "2.30.172" }, { "model": "my cloud pr4100", "scope": "eq", "trust": 0.6, "vendor": "wdc", "version": "2.30.172" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "CNNVD", "id": "CNNVD-201712-409" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:wdc:my_cloud_pr4100_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011514" } ] }, "cve": "CVE-2017-17560", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2017-17560", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-108595", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-17560", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-17560", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-17560", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201712-409", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-108595", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-17560", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "CNNVD", "id": "CNNVD-201712-409" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on Western Digital MyCloud PR4100 2.30.172 devices. The web administration component, /web/jquery/uploader/multi_uploadify.php, provides multipart upload functionality that is accessible without authentication and can be used to place a file anywhere on the device\u0027s file system. This allows an attacker the ability to upload a PHP shell onto the device and obtain arbitrary code execution as root. Western Digital My Cloud PR4100 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Web administration component is one of the Web administration components. There is a security vulnerability in the web management component of Western Digital MyCloud PR4100 version 2.30.172", "sources": [ { "db": "NVD", "id": "CVE-2017-17560" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" } ], "trust": 1.8 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-108595", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=43356", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-17560", "trust": 2.6 }, { "db": "EXPLOIT-DB", "id": "43356", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2017-011514", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201712-409", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "145447", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-108595", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-17560", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "CNNVD", "id": "CNNVD-201712-409" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "id": "VAR-201712-0862", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-108595" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:30:36.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "My Cloud PR4100", "trust": 0.8, "url": "https://support.wdc.com/product.aspx?ID=2706" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011514" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://github.com/rapid7/metasploit-framework/pull/9248" }, { "trust": 1.9, "url": "https://www.exploit-db.com/exploits/43356/" }, { "trust": 1.8, "url": "https://download.exploitee.rs/file/generic/exploiteers-defcon25.pdf" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-17560" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17560" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=56514" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/linux/http/wd_mycloud_multiupload_upload" } ], "sources": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "CNNVD", "id": "CNNVD-201712-409" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-108595" }, { "db": "VULMON", "id": "CVE-2017-17560" }, { "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "db": "CNNVD", "id": "CNNVD-201712-409" }, { "db": "NVD", "id": "CVE-2017-17560" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-12T00:00:00", "db": "VULHUB", "id": "VHN-108595" }, { "date": "2017-12-12T00:00:00", "db": "VULMON", "id": "CVE-2017-17560" }, { "date": "2018-01-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "date": "2017-12-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-409" }, { "date": "2017-12-12T18:29:00.230000", "db": "NVD", "id": "CVE-2017-17560" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-28T00:00:00", "db": "VULHUB", "id": "VHN-108595" }, { "date": "2019-05-28T00:00:00", "db": "VULMON", "id": "CVE-2017-17560" }, { "date": "2018-01-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-011514" }, { "date": "2019-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201712-409" }, { "date": "2024-11-21T03:18:10", "db": "NVD", "id": "CVE-2017-17560" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Western Digital My Cloud PR4100 Authentication vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-011514" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201712-409" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.