4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
6.1 Medium
AI Score
Confidence
Low
0.092 Low
EPSS
Percentile
94.7%
Western Digital My Net Router is prone to an information disclosure vulnerability.
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.803731");
script_version("2023-07-27T05:05:08+0000");
script_cve_id("CVE-2013-5006");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
script_tag(name:"creation_date", value:"2013-08-05 16:18:11 +0530 (Mon, 05 Aug 2013)");
script_name("Western Digital My Net Devices Information Disclosure Vulnerability");
script_tag(name:"summary", value:"Western Digital My Net Router is prone to an information disclosure vulnerability.");
script_tag(name:"vuldetect", value:"Send a crafted data via HTTP request and check whether it is able to read the
password or not.");
script_tag(name:"solution", value:"Upgrade to version 1.07.16, for the My Net N900 and My Net N900.
For My Net N600 and My Net N750 solution is to revert to the earlier firmware of 1.01.04 or 1.01.20,
or disable remote administrative access.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"insight", value:"The issue is due to the device storing the admin password in clear text in the
main_internet.php source code page as the value for 'var pass'.");
script_tag(name:"affected", value:"Western Digital My Net N600 1.03, 1.04,
Western Digital My Net N750 1.03, 1.04,
Western Digital My Net N900 1.05, 1.06 and
Western Digital My Net N900C 1.05, 1.06");
script_tag(name:"impact", value:"Successful exploitation will allow attacker to gain access to credential
information.");
script_xref(name:"URL", value:"http://seclists.org/bugtraq/2013/Aug/10");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/61361");
script_xref(name:"URL", value:"http://xforce.iss.net/xforce/xfdb/85903");
script_xref(name:"URL", value:"http://www.securityfocus.com/archive/1/527433");
script_xref(name:"URL", value:"http://archives.neohapsis.com/archives/bugtraq/2013-07/0146.html");
script_category(ACT_ATTACK);
script_tag(name:"qod_type", value:"remote_vul");
script_copyright("Copyright (C) 2013 Greenbone AG");
script_family("Web application abuses");
script_dependencies("gb_get_http_banner.nasl");
script_mandatory_keys("MyNetN679/banner");
script_require_ports("Services/www", 8080);
script_xref(name:"URL", value:"http://www.wdc.com/en");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
port = http_get_port(default:8080);
banner = http_get_remote_headers(port: port);
if(banner && banner =~ "MyNetN[6|7|9]")
{
req = http_get(item: "/main_internet.php", port:port);
res = http_keepalive_send_recv(port:port,data:req);
if(">WESTERN DIGITAL" >< res && "WIRELESS ROUTER" >< res
&& res =~ 'var pass=".*";' )
{
security_message(port:port);
exit(0);
}
}
exit(99);