Asus RT-AX56U URL Parameter update_json path traversal
文章推薦指數: 80 %
A vulnerability, which was classified as critical, was found in Asus RT-AX56U. This vulnerability is traded as CVE-2022-23970. EditHistoryDiffAPIJSONAPIXMLAPICSVSubmitLoginSignupVDB-196698·CVE-2022-23970AsusRT-AX56UURLParameterupdate_jsonpathtraversalEntryeditHistoryDiffjsonxmlCTICVSSMetaTempScoreCVSSisastandardizedscoringsystemtodeterminepossibilitiesofattacks.TheTempScoreconsiderstemporalfactorslikedisclosure,exploitandcountermeasures.TheuniqueMetaScorecalculatestheaveragescoreofdifferentsourcestoprovideanormalizedscoringsystem.CurrentExploitPrice(≈)Ouranalystsaremonitoringexploitmarketsandareincontactwithvulnerabilitybrokers.Therangeindicatestheobservedorcalculatedexploitpricetobeseenonexploitmarkets.Agoodindicatortounderstandthemonetaryeffortrequiredforandthepopularityofanattack.CTIInterestScoreOurCyberThreatIntelligenceteamismonitoringdifferentwebsites,mailinglists,exploitmarketsandsocialmedianetworks.TheCTIInterestScoreidentifiestheinterestofattackersandthesecuritycommunityforthisspecificvulnerabilityinreal-time.Ahighscoreindicatesanelevatedrisktobetargetedforthisvulnerability.7.1$0-$5k0.18Avulnerability,whichwasclassifiedascritical,wasfoundinAsusRT-AX56U(versionunknown).Affectedisthefunctionupdate_jsonofthecomponentURLParameterHandler.Themanipulationwithanunknowninputleadstoadirectorytraversalvulnerability.CWEisclassifyingtheissueasCWE-22.Thisisgoingtohaveanimpactonconfidentiality,integrity,andavailability.CVEsummarizes:ASUSRT-AX56U’supdate_jsonfunctionhasapathtraversalvulnerabilityduetoinsufficientfilteringforspecialcharactersintheURLparameter.AnunauthenticatedLANattackercanoverwriteasystemfilebyuploadinganotherfilewiththesamefilename,whichresultsinservicedisruption.Theweaknesswaspresented04/08/2022.Theadvisoryisavailableattwcert.org.tw.ThisvulnerabilityistradedasCVE-2022-23970since01/26/2022.Theexploitabilityistoldtobeeasy.Accesstothelocalnetworkisrequiredforthisattack.Theexploitationdoesn'trequireanyformofauthentication.Technicaldetailsareknown,butthereisnoavailableexploit.ThestructureofthevulnerabilitydefinesapossiblepricerangeofUSD$0-$5katthemoment(estimationcalculatedon04/09/2022).Thereisnoinformationaboutpossiblecountermeasuresknown.Itmaybesuggestedtoreplacetheaffectedobjectwithanalternativeproduct.ProductinfoeditVendorAsusNameRT-AX56UCPE2.3infoedit🔒CPE2.2infoedit🔒CVSSv3infoeditVulDBMetaBaseScore:7.2VulDBMetaTempScore:7.1VulDBBaseScore:6.3VulDBTempScore:6.1VulDBVector:🔒VulDBReliability:🔍CNABaseScore:8.1CNAVector(TWCERT/CC):🔒CVSSv2infoeditAVACAuCIA🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍🔍VectorComplexityAuthenticationConfidentialityIntegrityAvailabilityunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockunlockVulDBBaseScore:🔒VulDBTempScore:🔒VulDBReliability:🔍ExploitinginfoeditClass:DirectorytraversalCWE:CWE-22ATT&CK:UnknownLocal:NoRemote:PartiallyAvailability:🔒Status:NotdefinedEPSSScore:🔒EPSSPercentile:🔒PricePrediction:🔍CurrentPriceEstimation:🔒0-DayunlockunlockunlockunlockTodayunlockunlockunlockunlockThreatIntelligenceinfoeditInterest:🔍ActiveActors:🔍ActiveAPTGroups:🔍CountermeasuresinfoeditRecommended:nomitigationknownStatus:🔍0-DayTime:🔒Timelineinfoedit01/26/2022CVEreserved04/08/2022+71daysAdvisorydisclosed04/08/2022+0daysVulDBentrycreated04/09/2022+1daysVulDBlastupdateSourcesinfoeditVendor:asus.comAdvisory:twcert.org.twStatus:NotdefinedCVE:CVE-2022-23970(🔒)EntryinfoeditCreated:04/08/202212:55Updated:04/09/202211:02Changes:(1)source_cve_nvd_summaryComplete:🔍CommentsNocommentsyet.Languages:en.Pleaselogintocomment.◂PreviousOverviewNext▸DoyouwanttouseVulDBinyourproject?UsetheofficialAPItoaccessentrieseasily!
延伸文章資訊
- 1CVE-2022-23970 - The MITRE Corporation
- 2漏洞通報|資安聯盟|資安電子報-ASUS RT-AX56U - Path Traversal
CVE ID, CVE-2022-23970. CVSS, 8.1 (High) CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H. 影響產品, ASUS...
- 3CVE-2022-23970 Detail - NVD - NIST
- 4CVE-2022-23970
CVE-2022-23970 is a disclosure identifier tied to a security vulnerability with the following det...
- 5CVE-2022-23970 - Vulners