CVE-2014-9699

The MakerBot Replicator 5G printer runs an Apache HTTP Server with directory indexing enabled. Apache logs, system logs, design files (i.e., a history of print files), and more are exposed to unauthenticated attackers through this HTTP server.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:makerbot:replicator_5th_generation_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:makerbot:replicator_5th_generation:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:21

Type Values Removed Values Added
References () https://secur3.us/index.php/vulnerabilities/ - Broken Link () https://secur3.us/index.php/vulnerabilities/ - Broken Link
References () https://support.makerbot.com/learn/makerbot-desktop-software/release-notes/makerbot-desktop-release-notes_13520 - Release Notes, Vendor Advisory () https://support.makerbot.com/learn/makerbot-desktop-software/release-notes/makerbot-desktop-release-notes_13520 - Release Notes, Vendor Advisory

Information

Published : 2019-06-24 21:15

Updated : 2024-11-21 02:21


NVD link : CVE-2014-9699

Mitre link : CVE-2014-9699

CVE.ORG link : CVE-2014-9699


JSON object : View

Products Affected

makerbot

  • replicator_5th_generation_firmware
  • replicator_5th_generation
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor