|
|||
Rule General Information |
---|
Release Date: | 2017-05-12 | |
Rule Name: | Goahead Web Server HTTP GET Request System.ini Information Disclosure Vulnerability (CVE-2017-5674) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Others | |
Reference: | https://www.cybereason.com/cve-ip-cameras/ https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/ |
|
Solutions |
---|
The vendor has updated advisory on its official website. Please check it for more information. |