Vulnerability Description
A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi network. An attacker can send the POST parameters downfiles and cur-folder (with a crafted ../ payload) to the download.script endpoint. This will create a MusicPlayerArchive.zip archive that is publicly accessible and includes the content of any requested file (such as the /etc/passwd file).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Musicloud Project | Musicloud | 1.6 |
Related Weaknesses (CWE)
References
- https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465ExploitThird Party Advisory
- https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465ExploitThird Party Advisory
FAQ
What is CVE-2019-8389?
CVE-2019-8389 is a vulnerability with a CVSS score of 8.1 (HIGH). A file-read vulnerability was identified in the Wi-Fi transfer feature of Musicloud 1.6. By default, the application runs a transfer service on port 8080, accessible by everyone on the same Wi-Fi netw...
How severe is CVE-2019-8389?
CVE-2019-8389 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-8389?
Check the references section above for vendor advisories and patch information. Affected products include: Musicloud Project Musicloud.