CVE-2013-5219

LOW3.3/ 10.0
Share:
Published: December 30, 2013 at 04:53 AM
Modified: April 11, 2025 at 12:51 AM
Source: cve@mitre.org

Vulnerability Description

Directory traversal vulnerability on the HOT HOTBOX router with software 2.1.11 allows remote attackers to read arbitrary files via a .. (dot dot) in a URI, as demonstrated by a request for /etc/passwd.

CVSS Metrics

Base Score
3.3
Severity
LOW
Vector String
AV:A/AC:L/Au:N/C:P/I:N/A:N

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

A critical directory traversal vulnerability exists in the HOT HOTBOX router, allowing attackers to remotely read sensitive files like /etc/passwd. This flaw enables attackers to gain unauthorized access to system information, potentially leading to further compromise and data breaches.

02 // Vulnerability Mechanism

Step 1: Crafting the Payload: The attacker constructs a malicious HTTP request containing a directory traversal payload. This payload typically includes the sequence ../ repeated to navigate up the directory tree, followed by the target file path (e.g., /etc/passwd).

Step 2: Sending the Request: The attacker sends the crafted HTTP request to the vulnerable HOT HOTBOX router.

Step 3: Request Processing: The router's web server receives the request and attempts to process the URI. Due to the vulnerability, the server fails to properly sanitize the input.

Step 4: File Access: The server, using the unsanitized path, attempts to open and serve the requested file (e.g., /etc/passwd).

Step 5: Information Disclosure: The router returns the contents of the requested file (e.g., /etc/passwd) in the HTTP response, providing the attacker with sensitive system information.

03 // Deep Technical Analysis

The vulnerability stems from a failure to properly sanitize user-supplied input when handling URI requests. Specifically, the router's web server does not adequately validate the path provided in the URI. By including ../ sequences in the request, an attacker can navigate outside the intended directory structure and access arbitrary files on the system. The root cause is a lack of input validation, allowing the attacker to manipulate the file path and bypass security controls. The webserver likely uses a function that constructs a file path based on the URI, and this function does not properly sanitize the input before using it to access the file system. This allows the attacker to traverse the directory structure.

CVE-2013-5219 - LOW Severity (3.3) | Free CVE Database | 4nuxd