ID

VAR-201905-0058


CVE

CVE-2019-9949


TITLE

plural Western Digital My Cloud Link interpretation vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-004912

DESCRIPTION

Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command. Other commands might also be susceptible. Code can be executed because the "name" parameter passed to the cgi_unzip command is not sanitized. plural Western Digital My Cloud The product contains a link interpretation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Western Digital MyCloud Mirror Gen 2 and others are products of Western Digital Corporation. WesternDigitalMyCloudMirrorGen2 is a personal cloud storage device. WesternDigitalMyCloudEX2Ultra is a personal cloud storage device. The Western Digital MyCloud EX2100 is a personal storage device. A security vulnerability exists in several WesternDigital products that originated from the failure of the program to filter the \342\200\230name\342\200\231 parameter passed to the cgi_unzip command. An attacker could exploit the vulnerability to execute code

Trust: 2.25

sources: NVD: CVE-2019-9949 // JVNDB: JVNDB-2019-004912 // CNVD: CNVD-2019-16523 // VULMON: CVE-2019-9949

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-16523

AFFECTED PRODUCTS

vendor:westerndigitalmodel:my cloud ex2 ultrascope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud dl2100scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloudscope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud ex2100scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud mirror gen2scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud dl4100scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud pr4100scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud pr2100scope:ltversion:2.31.183

Trust: 1.0

vendor:westerndigitalmodel:my cloud ex4100scope:ltversion:2.31.183

Trust: 1.0

vendor:western digitalmodel:my cloud dl2100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud dl4100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud ex2 ultrascope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud ex2100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud ex4100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud mirror gen2scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud pr2100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloud pr4100scope:ltversion:2.31.183

Trust: 0.8

vendor:western digitalmodel:my cloudscope:ltversion:2.31.183

Trust: 0.8

vendor:westernmodel:digital my cloudscope:ltversion:2.31.183

Trust: 0.6

sources: CNVD: CNVD-2019-16523 // JVNDB: JVNDB-2019-004912 // NVD: CVE-2019-9949

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-9949
value: HIGH

Trust: 1.0

NVD: CVE-2019-9949
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-16523
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201905-959
value: HIGH

Trust: 0.6

VULMON: CVE-2019-9949
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-9949
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-16523
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-9949
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-16523 // VULMON: CVE-2019-9949 // JVNDB: JVNDB-2019-004912 // CNNVD: CNNVD-201905-959 // NVD: CVE-2019-9949

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.8

sources: JVNDB: JVNDB-2019-004912 // NVD: CVE-2019-9949

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-959

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-201905-959

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004912

PATCH

title:New Release - My Cloud Firmware Versions 2.31.183 (05/20/2019)url:https://community.wd.com/t/new-release-my-cloud-firmware-versions-2-31-183-05-20-2019/237717

Trust: 0.8

title:Patches for several WesternDigital product code execution vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/163029

Trust: 0.6

title:Multiple Western Digital Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92914

Trust: 0.6

title:https://github.com/bnbdr/wd-rceurl:https://github.com/bnbdr/wd-rce

Trust: 0.1

sources: CNVD: CNVD-2019-16523 // VULMON: CVE-2019-9949 // JVNDB: JVNDB-2019-004912 // CNNVD: CNNVD-201905-959

EXTERNAL IDS

db:NVDid:CVE-2019-9949

Trust: 3.1

db:JVNDBid:JVNDB-2019-004912

Trust: 0.8

db:CNVDid:CNVD-2019-16523

Trust: 0.6

db:CNNVDid:CNNVD-201905-959

Trust: 0.6

db:VULMONid:CVE-2019-9949

Trust: 0.1

sources: CNVD: CNVD-2019-16523 // VULMON: CVE-2019-9949 // JVNDB: JVNDB-2019-004912 // CNNVD: CNNVD-201905-959 // NVD: CVE-2019-9949

REFERENCES

url:https://community.wd.com/t/new-release-my-cloud-firmware-versions-2-31-183-05-20-2019/237717

Trust: 1.7

url:https://github.com/bnbdr/wd-rce/

Trust: 1.7

url:https://bnbdr.github.io/posts/wd/

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-9949

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-9949

Trust: 0.8

url:https://web.nvd.nist.gov//vuln/detail/cve-2019-9949

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/59.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/bnbdr/wd-rce

Trust: 0.1

sources: CNVD: CNVD-2019-16523 // VULMON: CVE-2019-9949 // JVNDB: JVNDB-2019-004912 // CNNVD: CNNVD-201905-959 // NVD: CVE-2019-9949

SOURCES

db:CNVDid:CNVD-2019-16523
db:VULMONid:CVE-2019-9949
db:JVNDBid:JVNDB-2019-004912
db:CNNVDid:CNNVD-201905-959
db:NVDid:CVE-2019-9949

LAST UPDATE DATE

2024-11-23T22:33:56.129000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-16523date:2019-06-05T00:00:00
db:VULMONid:CVE-2019-9949date:2019-05-29T00:00:00
db:JVNDBid:JVNDB-2019-004912date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201905-959date:2019-05-30T00:00:00
db:NVDid:CVE-2019-9949date:2024-11-21T04:52:39.470

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-16523date:2019-06-05T00:00:00
db:VULMONid:CVE-2019-9949date:2019-05-23T00:00:00
db:JVNDBid:JVNDB-2019-004912date:2019-06-11T00:00:00
db:CNNVDid:CNNVD-201905-959date:2019-05-23T00:00:00
db:NVDid:CVE-2019-9949date:2019-05-23T14:29:08