A Directory Traversal in the Web interface of the Allied Telesis AT-GS950/8 until Firmware AT-S107 V.1.1.3 [1.00.047] allows unauthenticated attackers to read arbitrary system files via a GET request. NOTE: This is an End-of-Life product.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/155504/Allied-Telesis-AT-GS950-8-Directory-Traversal.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Nov/31 | Mailing List Third Party Advisory | 
| https://pastebin.com/dpEGKUGz | Third Party Advisory | 
| http://packetstormsecurity.com/files/155504/Allied-Telesis-AT-GS950-8-Directory-Traversal.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Nov/31 | Mailing List Third Party Advisory | 
| https://pastebin.com/dpEGKUGz | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2019-11-29 19:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18922
Mitre link : CVE-2019-18922
CVE.ORG link : CVE-2019-18922
JSON object : View
Products Affected
                alliedtelesis
- at-gs950\/8
 - at-gs950\/8_firmware
 
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
