CWE
22
Advisory Published
Updated

CVE-2022-29836: Post-Auth Path Traversal Vulnerability Allows to Custom Package Installation via HTTP API

First published: Wed Nov 09 2022(Updated: )

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability was discovered via an HTTP API on Western Digital My Cloud Home; My Cloud Home Duo; and SanDisk ibi devices that could allow an attacker to abuse certain parameters to point to random locations on the file system. This could also allow the attacker to initiate the installation of custom packages at these locations. This can only be exploited once the attacker has been authenticated to the device. This issue affects: Western Digital My Cloud Home and My Cloud Home Duo versions prior to 8.11.0-113 on Linux; SanDisk ibi versions prior to 8.11.0-113 on Linux.

Credit: psirt@wdc.com

Affected SoftwareAffected VersionHow to fix
Westerndigital My Cloud Home Firmware<8.11.0-113
Westerndigital My Cloud Home
Westerndigital My Cloud Home Duo Firmware<8.11.0-113
Westerndigital My Cloud Home Duo
Westerndigital Sandisk Ibi Firmware<8.11.0-113
Westerndigital Sandisk Ibi

Remedy

Your My Cloud Home and ibi device will be automatically updated to reflect the latest firmware version.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2022-29836.

  • What is the severity of CVE-2022-29836?

    The severity of CVE-2022-29836 is medium with a severity value of 4.3.

  • Which devices are affected by CVE-2022-29836?

    CVE-2022-29836 affects Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi devices.

  • How can an attacker exploit CVE-2022-29836?

    An attacker can exploit CVE-2022-29836 by abusing certain parameters to point to random locations on the file system via an HTTP API on the affected devices.

  • Is there a fix available for CVE-2022-29836?

    Yes, a fix for CVE-2022-29836 is available. Please refer to the vendor's official support page for more information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203