First published: Wed Aug 30 2017(Updated: )
The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows directory traversal attacks for reading arbitrary files via the module/admin_conf/download.php file parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EyesOfNetwork EyesOfNetwork | =5.1-0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13780 is classified as a medium severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2017-13780, upgrade EyesOfNetwork to a version beyond 5.1-0 that addresses this directory traversal issue.
CVE-2017-13780 allows attackers to read arbitrary files from the system, which can lead to sensitive information disclosure.
A possible workaround for CVE-2017-13780 is to restrict access to the module/admin_conf/download.php file through server configuration.
CVE-2017-13780 specifically affects EyesOfNetwork version 5.1-0.