The diagnostics web interface in the Yeahlink Ultra-elegant IP Phone SIP-T41P (firmware 66.83.0.35) does not validate (escape) the path information (path traversal), which allows an authenticated remote attacker to get access to privileged information (e.g., /etc/passwd) via path traversal (relative path information in the file parameter of the corresponding POST request).
References
Link | Resource |
---|---|
https://www.sit.fraunhofer.de/de/securitytestlab/ | Third Party Advisory |
https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Yealink_Ultra-elegantIPPhone_SIPT41P.pdf?_=1549375271 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-05-29 18:29
Updated : 2024-02-04 20:20
NVD link : CVE-2018-16221
Mitre link : CVE-2018-16221
CVE.ORG link : CVE-2018-16221
JSON object : View
Products Affected
yealink
- ultra-elegant_ip_phone_sip-t41p
- ultra-elegant_ip_phone_sip-t41p_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')