Eval injection vulnerability in frontview/lib/np_handler.pl in the FrontView web interface in NETGEAR ReadyNAS RAIDiator before 4.1.12 and 4.2.x before 4.2.24 allows remote attackers to execute arbitrary Perl code via a crafted request, related to the "forgot password workflow."
References
Link | Resource |
---|---|
http://www.tripwire.com/register/security-advisory-netgear-readynas/ | Third Party Advisory |
http://www.tripwire.com/state-of-security/vulnerability-management/readynas-flaw-allows-root-access-unauthenticated-http-request/ | Third Party Advisory |
http://packetstormsecurity.com/files/123726/Netgear-ReadyNAS-Complete-System-Takeover.html | Third Party Advisory VDB Entry |
http://www.exploit-db.com/exploits/29815 | Exploit Third Party Advisory VDB Entry |
http://www.osvdb.org/98826 | Broken Link |
http://www.readynas.com/?p=7002 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2013-12-12 10:55
Updated : 2019-07-18 05:27
NVD link : CVE-2013-2751
Mitre link : CVE-2013-2751
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
netgear
- raidiator