Vulnerability Description
MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SSRF) issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Micasaverde | Veralite Firmware | 1.5.408 |
| Micasaverde | Veralite | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-TraversExploitThird Party AdvisoryVDB Entry
- http://www.exploit-db.com/exploits/27286ExploitThird Party AdvisoryVDB Entry
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txtExploit
- http://packetstormsecurity.com/files/122654/MiCasaVerde-VeraLite-1.5.408-TraversExploitThird Party AdvisoryVDB Entry
- http://www.exploit-db.com/exploits/27286ExploitThird Party AdvisoryVDB Entry
- https://www3.trustwave.com/spiderlabs/advisories/TWSL2013-019.txtExploit
FAQ
What is CVE-2013-4864?
CVE-2013-4864 is a vulnerability with a CVSS score of 9.8 (CRITICAL). MiCasaVerde VeraLite with firmware 1.5.408 allows remote attackers to send HTTP requests to intranet servers via the url parameter to cgi-bin/cmh/proxy.sh, related to a Server-Side Request Forgery (SS...
How severe is CVE-2013-4864?
CVE-2013-4864 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2013-4864?
Check the references section above for vendor advisories and patch information. Affected products include: Micasaverde Veralite Firmware, Micasaverde Veralite.