Server-Side Request Forgery (SSRF) in Central WiFiManager - CVE-2018-15517

 

Server-Side Request Forgery (SSRF) in Central WiFiManager - CVE-2018-15517

Published: January 31, 2019 / Updated: August 8, 2020


Vulnerability identifier: #VU36181
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2018-15517
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: D-Link
Affected software:
Central WiFiManager

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.


How to mitigate CVE-2018-15517

Install update from vendor's website.

Sources