![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.141482 |
Category: | Web application abuses |
Title: | Seagate Personal Cloud < 4.3.19.3 Information Disclosure Vulnerability - Active Check |
Summary: | Seagate Personal Cloud is prone to multiple information; disclosure vulnerabilities. |
Description: | Summary: Seagate Personal Cloud is prone to multiple information disclosure vulnerabilities. Vulnerability Insight: It was found that the web application used to manage the NAS is affected by various unauthenticated information disclosure vulnerabilities. The web application is configured with an HTML5 cross-origin resource sharing (CORS) policy that trusts any Origin. In addition, the NAS is available using the personalcloud.local domain name via multicast Domain Name System (mDNS). Due to this it is possible to exploit this issue via a malicious website without requiring the NAS to be directly accessible over the internet and/or to know its IP address. Affected Software/OS: Seagate Media Server in Seagate Personal Cloud prior to version 4.3.19.3. Solution: Update to firmware version 4.3.19.3 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2018 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |