Conarc iChannel allows remote attackers to obtain sensitive information, modify the configuration, or cause a denial of service (by deleting the configuration) via a wc.dll?wwMaint~EditConfig request (which reaches an older version of a West Wind Web Connection HTTP service).
References
Link | Resource |
---|---|
http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43377/ | Issue Tracking Third Party Advisory VDB Entry |
http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43377/ | Issue Tracking Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.information-paradox.net/2017/12/conarc-ichannel-unauthenticated.html - Issue Tracking, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43377/ - Issue Tracking, Third Party Advisory, VDB Entry |
Information
Published : 2017-12-19 07:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17759
Mitre link : CVE-2017-17759
CVE.ORG link : CVE-2017-17759
JSON object : View
Products Affected
conarc
- ichannel
CWE