Product:

My_cloud_firmware

(Westerndigital)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 12
Date Id Summary Products Score Patch Annotated
2018-03-30 CVE-2018-9148 Western Digital WD My Cloud v04.05.00-320 devices embed the session token (aka PHPSESSID) in filenames, which makes it easier for attackers to bypass authentication by listing a directory. NOTE: this can be exploited in conjunction with CVE-2018-7171 for remote authentication bypass within a product that uses My Cloud. My_cloud_firmware 9.8
2019-05-23 CVE-2019-9949 Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command.... My_cloud_dl2100_firmware, My_cloud_dl4100_firmware, My_cloud_ex2100_firmware, My_cloud_ex2_ultra_firmware, My_cloud_ex4100_firmware, My_cloud_firmware, My_cloud_mirror_gen2_firmware, My_cloud_pr2100_firmware, My_cloud_pr4100_firmware 8.8