Vulnerability Description
Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low privileged’ attacker can read any file on the target host.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Corero | Securewatch Managed Services | 9.7.2.0020 |
Related Weaknesses (CWE)
References
- https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/Product
- https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapExploitThird Party Advisory
- https://www.corero.com/blog/data-sheets-corero-securewatch-managed-services/Product
- https://www.shielder.it/advisories/corero_secure_watch_managed_services-get_snapExploitThird Party Advisory
FAQ
What is CVE-2021-38136?
CVE-2021-38136 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the snap_file parameter in the /it-IT/splunkd/__raw/services/get_snapshot HTTP API endpoint. A ‘low pri...
How severe is CVE-2021-38136?
CVE-2021-38136 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-38136?
Check the references section above for vendor advisories and patch information. Affected products include: Corero Securewatch Managed Services.