#VU12133 Path traversal in iDRAC7 and iDRAC8


Published: 2018-04-24 | Updated: 2019-02-21

Vulnerability identifier: #VU12133

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1211

CWE-ID: CWE-22

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
iDRAC7
Web applications / Remote management & hosting panels
iDRAC8
Web applications / Remote management & hosting panels

Vendor: Dell

Description
The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists in the Web server's URI parser due to path traversal. A remote attacker can read configuration settings from the iDRAC by querying specific URI strings.

Mitigation
Update to version 2.52.52.52.

Vulnerable software versions

iDRAC7: 2.10.10.10 - 2.50.50.50

iDRAC8: 2.00.00.00 - 2.50.50.50


External links
http://en.community.dell.com/techcenter/extras/m/white_papers/20485410


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability