Directory traversal vulnerability in HTTP server for Alchemy Eye and Alchemy Network Monitor allows remote attackers to execute arbitrary commands via an HTTP request containing (1) a .. in versions 2.0 through 2.6.18, or (2) a DOS device name followed by a .. in versions 2.6.19 through 3.0.10.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Alchemy_eye | Alchemy_lab | 2.0 (including) | 2.0 (including) |
Alchemy_eye | Alchemy_lab | 2.1 (including) | 2.1 (including) |
Alchemy_eye | Alchemy_lab | 2.2 (including) | 2.2 (including) |
Alchemy_eye | Alchemy_lab | 2.3 (including) | 2.3 (including) |
Alchemy_eye | Alchemy_lab | 2.4 (including) | 2.4 (including) |
Alchemy_eye | Alchemy_lab | 2.5 (including) | 2.5 (including) |
Alchemy_eye | Alchemy_lab | 2.6 (including) | 2.6 (including) |
Alchemy_eye | Alchemy_lab | 2.6.18 (including) | 2.6.18 (including) |
Alchemy_eye | Alchemy_lab | 2.6.19 (including) | 2.6.19 (including) |
Alchemy_eye | Alchemy_lab | 3.0 (including) | 3.0 (including) |
Alchemy_eye | Alchemy_lab | 3.0.10 (including) | 3.0.10 (including) |
Alchemy_network_monitor | Dek_software | * | 3.0.10 (including) |