{ "schema_version": "1.4.0", "id": "GHSA-f3m9-fjq3-x8h8", "modified": "2022-05-14T03:46:36Z", "published": "2022-05-14T03:46:36Z", "aliases": [ "CVE-2017-17662" ], "details": "Directory traversal in the HTTP server on Yawcam 0.2.6 through 0.6.0 devices allows attackers to read arbitrary files through a sequence of the form '.x./' or '....\\x/' where x is a pattern composed of one or more (zero or more for the second pattern) of either \\ or ..\\ -- for example a '.\\./', '....\\/' or '...\\./' sequence. For files with no extension, a single dot needs to be appended to ensure the HTTP server does not alter the request, e.g., a \"GET /.\\./.\\./.\\./.\\./.\\./.\\./.\\./windows/system32/drivers/etc/hosts.\" request.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17662" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/145770/Yawcam-0.6.0-Directory-Traversal.html" }, { "type": "WEB", "url": "http://www.yawcam.com/news.php" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-01-10T18:29:00Z" } }