what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Sitecom Home Storage Center Arbitrary File Upload

Sitecom Home Storage Center Arbitrary File Upload
Posted Sep 14, 2012
Authored by Mattijs van Ommeren

Sitecom Home Storage Center suffers from a remote shell upload vulnerability.

tags | advisory, remote, shell
SHA-256 | 95301ce5c082876b54aa1eb5f0b12c6bba5aea60bc103a568674da684e52a0e5

Sitecom Home Storage Center Arbitrary File Upload

Change Mirror Download
Security Advisory AA-007: Arbitrary File Upload Vulnerability in Sitecom Home Storage Center

Severity Rating: High
Discovery Date: July 29, 2012
Vendor Notification: July 30, 2012
Disclosure Date: September 11, 2012

Vulnerability Type=
Arbitrary file upload

Impact=
Loss of system integrity

Severity=
Alcyon rates the severity of this vulnerability as high due to the following properties:
- Ease of exploitation;
- No authentication credentials required;
- No knowledge about individual victims required;
- No interaction with the victim required.

Products and firmware versions affected=
- Sitecom MD-253 firmware version up to and including 2.4.17
- Sitecom MD-254 firmware version up to and including 2.4.17
- Possibly other rebranded Mapower network storage products

Risk Assessment=
An attacker can upload arbitrary files to the device. Combining the command injection vulnerability described in advisory AA-008 an attacker can obtain a remote root shell.

Vulnerability=
The CGI executable that is responsible for handling firmware updates allows arbitrary files to be uploaded to the /tmp folder. Furthermore the files are automatically assigned execute permissions and are owned by root.

Proof of Concept Exploit=
PoC code exploiting this and other vulnerabilities to obtain an interactive root shell can be found here:
- http://www.alcyon.nl/blog/sitecom-poc-exploit

Risk Mitigation=
At the time of disclosure no updated firmware version was available.

We recommend that you limit access to the web management UI of the device by utilizing proper packet filtering and/or NAT on your router in order to limit network access to your NAS. Note that this will not completely eliminate the risk of exploitation, since the product is affected by other vulnerabilities that can be leveraged using client side attacks.

Vendor responses=
None

Fixed Versions=
There is currently no vendor patch available. A third party solution is available on:
- http://www.alcyon.nl/blog/sitecom-nas-md-253-and-md-254-risk-mitigation/

Latest version of this advisory=
- http://www.alcyon.nl/advisories/aa-007

References=
Security Advisory AA-008: Command Injection Vulnerability in Sitecom Home Storage Center
- http://www.alcyon.nl/advisories/aa-008
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close