Foscam 11.37.2.x < 11.37.2.49 Directory Traversal

high Nessus Plugin ID 65670

Synopsis

The remote web server is affected by a directory traversal vulnerability.

Description

The version of the Foscam IP Camera firmware 11.37.2.x < 11.37.2.49 on the remote host has a directory traversal vulnerability. A remote attacker could exploit this to access the entire filesystem and wifi credentials, for example, with a specially crafted request to retrieve the host's /proc/kcore file.

Note that Foscam cameras can be re-branded and re-sold by other vendors.

Contact the vendor for vulnerability and firmware update information for other firmware base versions.

Solution

Upgrade to Foscam 11.37.2.49 or later.

See Also

https://seclists.org/bugtraq/2013/Mar/8

Plugin Details

Severity: High

ID: 65670

File Name: foscam_11_37_2_49.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 3/24/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

Vulnerability Information

CPE: cpe:/o:foscam:fi8919w

Required KB Items: www/foscam

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/18/2013

Vulnerability Publication Date: 3/1/2013

Exploitable With

Core Impact

Reference Information

CVE: CVE-2013-2560

BID: 58290