7.5
CVSSv2

CVE-2014-2846

Published: 28/04/2014 Updated: 24/02/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in opt/arkeia/wui/htdocs/index.php in the WD Arkeia virtual appliance (AVA) with firmware prior to 10.2.9 allows remote malicious users to read arbitrary files and execute arbitrary PHP code via a ..././ (dot dot dot slash dot slash) in the lang Cookie parameter, as demonstrated by a request to login/doLogin.

Vulnerable Product Search on Vulmon Subscribe to Product

westerndigital arkeia_virtual_appliance_firmware

Exploits

SEC Consult Vulnerability Lab Security Advisory < 20140423-0 > ======================================================================= title: Path Traversal/Remote Code Execution product: WD Arkeia Virtual Appliance (AVA) vulnerable version: All Arkeia Network Backup releases (ASA/APA/AVA) since 703 fixed v ...
WD Arkeia Virtual Appliance versions 703 up to 1028 suffer from directory traversal and remote command execution vulnerabilities ...