Directory traversal vulnerability in the web server in Philips Electronics VOIP841 DECT Phone with firmware 1.0.4.50 and 1.0.4.80 allows remote authenticated users to read arbitrary files via a .. (dot dot) in a GET request. NOTE: this can be leveraged with CVE-2008-4874 for unauthenticated access to sensitive files such as (1) save.dat and (2) apply.log, which can contain other credentials such as the Skype username and password.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/5113 | exploit |
http://osvdb.org/42941 | vdb entry |
http://secunia.com/advisories/28978 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/27790 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/40534 | vdb entry |
http://www.vupen.com/english/advisories/2008/0583 | vdb entry |
http://www.securityfocus.com/archive/1/488127/100/200/threaded | mailing list |
http://securityreason.com/securityalert/4536 | third party advisory |