Advisory Details

March 26th, 2021

NETGEAR ProSAFE Network Management System ConfigFileController realName Directory Traversal Information Disclosure and Denial-of-Service Vulnerability

ZDI-21-358
ZDI-CAN-12125

CVE ID CVE-2021-27275
CVSS SCORE 8.3, AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
AFFECTED VENDORS NETGEAR
AFFECTED PRODUCTS ProSAFE Network Management System
VULNERABILITY DETAILS

This vulnerability allows remote attackers to disclose sensitive information and delete arbitrary files on affected installations of NETGEAR ProSAFE Network Management System. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.

The specific flaw exists within the ConfigFileController class. When parsing the realName parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose sensitive information or to create a denial-of-service condition on the system.

ADDITIONAL DETAILS NETGEAR has issued an update to correct this vulnerability. More details can be found at:
https://kb.netgear.com/000062687/Security-Advisory-for-Denial-of-Service-on-NMS300-PSV-2020-0561
DISCLOSURE TIMELINE
  • 2020-10-30 - Vulnerability reported to vendor
  • 2021-03-26 - Coordinated public release of advisory
CREDIT rgod
BACK TO ADVISORIES