Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command. Other commands might also be susceptible. Code can be executed because the "name" parameter passed to the cgi_unzip command is not sanitized.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Westerndigital
Subscribe
|
My Cloud
Subscribe
My Cloud Dl2100
Subscribe
My Cloud Dl2100 Firmware
Subscribe
My Cloud Dl4100
Subscribe
My Cloud Dl4100 Firmware
Subscribe
My Cloud Ex2100
Subscribe
My Cloud Ex2100 Firmware
Subscribe
My Cloud Ex2 Ultra
Subscribe
My Cloud Ex2 Ultra Firmware
Subscribe
My Cloud Ex4100
Subscribe
My Cloud Ex4100 Firmware
Subscribe
My Cloud Firmware
Subscribe
My Cloud Mirror Gen2
Subscribe
My Cloud Mirror Gen2 Firmware
Subscribe
My Cloud Pr2100
Subscribe
My Cloud Pr2100 Firmware
Subscribe
My Cloud Pr4100
Subscribe
My Cloud Pr4100 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-19303 | Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command. Other commands might also be susceptible. Code can be executed because the "name" parameter passed to the cgi_unzip command is not sanitized. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:10:08.808Z
Reserved: 2019-03-23T00:00:00
Link: CVE-2019-9949
No data.
Status : Modified
Published: 2019-05-23T14:29:08.000
Modified: 2024-11-21T04:52:39.470
Link: CVE-2019-9949
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD