AirLive WL-2600CAM IP Camera Security Bypass Security Issue


Description   A security issue has been reported in AirLive WL-2600CAM IP Camera, which can be exploited by malicious users to bypass certain security restrictions.
The security issue is caused due to an error when handling HTTP GET requests to cgi-bin/operator/param?action=list&group=General.UserID, which can be exploited to bypass certain access restrictions and subsequently e.g. gain knowledge of the administrative user's credentials.
Successful exploitation requires "operator" permissions.
     
Vulnerable Products   Vulnerable OS:
AirLive WL-2600CAM IP CameraVulnerable Software:
     
Solution   No official solution is currently available.
     
CVE  
     
References   http://packetstormsecurity.com/files/122001/Airlive-CSRF-Traversal-Disclosure-Denial-Of-Service.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Possible buffer overflow on URL
3.2.0
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2013-06-27 

 Target Type 
Server 

 Possible exploit 
Remote