Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html | vdb entry third party advisory |
http://www.tripwire.com/register/security-advisory-netgear-readynas/ | third party advisory |
http://www.readynas.com/?p=7002 | patch vendor advisory |
http://www.tripwire.com/state-of-security/vulnerability-management/readynas-flaw-allows-root-access-unauthenticated-http-request/ | third party advisory |
http://www.osvdb.org/98826 | vdb entry broken link |
http://www.exploit-db.com/exploits/29815 | exploit vdb entry third party advisory |