First published: Wed Jul 20 2016(Updated: )
Portable UPnP SDK (aka libupnp) before 1.6.21 allows remote attackers to write to arbitrary files in the webroot via a POST request without a registered handler.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libupnp | ||
Debian Linux | =8.0 | |
libupnp | <=1.6.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6255 is classified as a medium severity vulnerability due to its potential for arbitrary file writing in the webroot.
To mitigate CVE-2016-6255, update the Portable UPnP SDK (libupnp) to version 1.6.21 or later.
CVE-2016-6255 affects systems using Portable UPnP SDK versions prior to 1.6.21, particularly on Debian 8.0.
Yes, CVE-2016-6255 allows remote attackers to exploit the vulnerability through a crafted POST request.
Exploitation of CVE-2016-6255 can lead to unauthorized write access to arbitrary files within the webroot.