Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:dlink:dir-2640-us_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACE0B76E-0581-4A2B-92D2-A1D7A93B098E", "versionEndIncluding": "1.11b02", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:dlink:dir-2640-us:-:*:*:*:*:*:*:*", "matchCriteriaId": "894C2BD1-B610-4F15-864E-92D6B515488D", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the \"message of the day\" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credentials, hardcoded plaintext passwords for other services, configuration files, and private keys can be disclosed in this fashion. Improper handling of filenames that identify virtual resources, such as \"/dev/urandom\" allows an attacker to effect a denial of service attack against the command line interfaces of the Quagga services (zebra and ripd)."}, {"lang": "es", "value": "Los servicios de Quagga en los DIR-2640 de D-Link menores o iguales a versi\u00f3n 1.11B02, est\u00e1n afectados por una vulnerabilidad de salto de ruta absoluto que permite a un atacante remoto y autenticado establecer el banner \"message of the day\" en cualquier archivo del sistema, permiti\u00e9ndole leer todo o parte del contenido de esos archivos. De este modo, puede revelarse informaci\u00f3n confidencial como credenciales con hash, contrase\u00f1as en texto plano embebidas para otros servicios, archivos de configuraci\u00f3n y claves privadas. El manejo inapropiado de los nombres de archivo que identifican recursos virtuales, como \"/dev/urandom\", permite a un atacante realizar un ataque de denegaci\u00f3n de servicio contra las interfaces de l\u00ednea de comandos de los servicios Quagga (zebra y ripd).\n"}], "id": "CVE-2021-20133", "lastModified": "2024-11-21T05:45:59.200", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:C/I:N/A:C", "version": "2.0"}, "exploitabilityScore": 5.1, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-12-30T22:15:08.230", "references": [{"source": "vulnreport@tenable.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2021-44"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://www.tenable.com/security/research/tra-2021-44"}], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-22"}], "source": "nvd@nist.gov", "type": "Primary"}]}