| Title | 複数の NetBiter 製品で使用される Antiweb におけるパストラバーサルの脆弱性 |
|---|---|
| Summary | 複数の NetBiter 製品で使用される Antiweb には、パストラバーサルの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | June 24, 2017, midnight |
| Registration Date | July 21, 2017, 5:59 p.m. |
| Last Update | July 21, 2017, 5:59 p.m. |
| CVSS3.0 : 緊急 | |
| Score | 9.1 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
| CVSS2.0 : 警告 | |
| Score | 6.4 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:N |
| HOYTECH |
| Antiweb 3.8.7 まで |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年07月21日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | In Anti-Web through 3.8.7, as used on NetBiter FGW200 devices through 3.21.2, WS100 devices through 3.30.5, EC150 devices through 1.40.0, WS200 devices through 3.30.4, EC250 devices through 1.40.0, and other products, an LFI vulnerability allows a remote attacker to read or modify files through a path traversal technique, as demonstrated by reading the password file, or using the template parameter to cgi-bin/write.cgi to write to an arbitrary file. |
|---|---|
| Publication Date | June 16, 2017, 12:29 p.m. |
| Registration Date | Jan. 26, 2021, 1:30 p.m. |
| Last Update | Nov. 21, 2024, 12:35 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:hoytech:antiweb:3.8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.8.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.8.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.7.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:*:*:*:*:*:*:*:* | 3.8.7 | ||||
| cpe:2.3:a:hoytech:antiweb:3.7.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.0.7:hms2:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.8.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.8.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:hoytech:antiweb:3.3.5:*:*:*:*:*:*:* | |||||