Vulnerability Note VU#168751
Emerson Network Power Avocent MergePoint Unity 2016 KVM and possibly other model switches contain a directory traversal vulnerability
Emerson Network Power Avocent MergePoint Unity 2016 KVM and possibly other model switches running firmware version 1.9.16473 and possibly previous versions contain a directory traversal vulnerability (CWE-23).
CWE-23: Relative Path Traversal
Emerson Network Power Avocent MergePoint Unity 2016 (MPU2016) KVM and possibly other model switches running firmware version 1.9.16473 and possibly previous versions contain a directory traversal vulnerability. This vulnerability is caused from a failure to sanitize the user-supplied input parameter "filename" within the download.php file. An attacker can use directory traversal to download critical files such as /etc/passwd to obtain the credentials for the device.
A remote authenticated attacker can download the configuration files of the device and use the obtained administrator credentials to access the interface. The attacker may then modify the settings of the device with unrestricted access.
Restrict access to the KVM switch interface
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Emerson Network Power||Affected||08 Oct 2013||07 Nov 2013|
CVSS Metrics (Learn More)
Thanks to Shady Liu (Shady.firstname.lastname@example.org) of DBAppSecurity Co.Ltd for reporting this vulnerability and Alfredo Ramirez for providing additional vulnerability information.
This document was written by Adam Rauf.
- CVE IDs: CVE-2013-6030
- Date Public: 23 Jan 2014
- Date First Published: 23 Jan 2014
- Date Last Updated: 07 Feb 2014
- Document Revision: 36
If you have feedback, comments, or additional information about this vulnerability, please send us email.