what you don't know can hurt you

Sitecom Home Storage Center Command Injection

Sitecom Home Storage Center Command Injection
Posted Sep 14, 2012
Authored by Mattijs van Ommeren

Sitecom Home Storage Center suffers from a remote command injection vulnerability.

tags | advisory, remote
MD5 | 339fc3821c6f8795dfd9bbd0c3621e9c

Sitecom Home Storage Center Command Injection

Change Mirror Download
Security Advisory AA-008: Command Injection Vulnerability in Sitecom Home Storage Center

Severity Rating: High
Discovery Date: July 29, 2012
Vendor Notification: July 30, 2012
Disclosure Date: September 12, 2012

Vulnerability Type=
Command injection

Impact=
System access

Severity=
Alcyon rates the severity of this vulnerability as high due to the following properties:
- Ease of exploitation;
- No authentication credentials required;
- No knowledge about individual victims required;
- No interaction with the victim required.

Products and firmware versions affected=
- Sitecom MD-253 firmware version up to and including 2.4.17
- Sitecom MD-254 firmware version up to and including 2.4.17
- Possibly other rebranded Mapower network storage products

Risk Assessment=
An attacker can execute commands as the root user. This allows for the download and execution of arbitrary binaries and shell scripts to gain complete control over the device.

Vulnerability=
The installer.cgi script allows commands to be injected. A limitation exists in the fact that commands can only exist

of characters that are not subject to URL-encoding. However, the hexadecimal representation of the space character (%20) gets converted to a space.

Proof of Concept Exploit=
Paste the following line into a browser address bar to display the device's admin credentials:

http://<victimIP>/cgi-bin/installer.cgi?SetExecTable&cat%20/etc/sysconfig/config/webmaster.conf

PoC code exploiting this and other vulnerabilities to obtain an interactive root shell can be found here:
- http://www.alcyon.nl/blog/sitecom-poc-exploit

Risk Mitigation=
At the time of disclosure no updated firmware version was available.

We recommend that you limit access to the web management UI of the device by utilizing proper packet filtering and/or NAT on your router in order to limit network access to your NAS. Note that this will not completely eliminate the risk of exploitation, since the product is affected by other vulnerabilities that can be leveraged using client side attacks.

Vendor responses=
None

Fixed Versions=
There is currently no vendor patch available. A third party solution is available on:
- http://www.alcyon.nl/blog/sitecom-nas-md-253-and-md-254-risk-mitigation/

Latest version of this advisory=
- http://www.alcyon.nl/advisories/aa-008

References=
Security Advisory AA-007: Arbitrary File Upload Vulnerability in Sitecom Home Storage Center
- http://www.alcyon.nl/advisories/aa-007
Login or Register to add favorites

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close