Twenty Year Anniversary

Seagate Personal Cloud SRN21C Arbitrary File Move

Seagate Personal Cloud SRN21C Arbitrary File Move
Posted Apr 19, 2018
Authored by Yorick Koster

Seagate Personal Cloud model SRN21C running firmware versions and allows for moving of arbitrary files.

tags | exploit, arbitrary
MD5 | 4a1b51ad89566e53f422c327f916fb1c

Seagate Personal Cloud SRN21C Arbitrary File Move

Change Mirror Download
Seagate Personal Cloud allows moving of arbitrary files
Yorick Koster, September 2017

Seagate Personal Cloud is a consumer-grade Network-Attached Storage
device (NAS). It was found that the web application used to manage the
NAS contains a vulnerability that allows an unauthenticated attacker to
move arbitrary files. The move operation is done with root privileges,
which basically allows moving any file to any location. The only
limitation is that the destination path resides on the same file system
as the source path.

Tested versions
This issue was tested on a Seagate Personal Cloud model SRN21C running
firmware versions and It is likely that other
devices/models are also affected.

This vulnerability has been fixed in firmware version


Personal Cloud runs a Python application named webapp2 that is created by LACIE. This application is built upon the unicorn library, another proprietary application from LACIE. The NAS ships with various versions of LACIE's REST API (version 3 up till and including version 8). Each REST endpoint is configured in a file named, each API version comes with its own file.

API version 6, 7, and 8 expose a REST endpoint named atomic_move that is accessible to unauthenticated users (public) as can be seen in the endpoint's configuration listed below.


validators = {
'atomic_move': {
'input': {
'source': unicode,
'destination': unicode,
'force': bool
'output': {

The atomic_move endpoint can be used to move a file to a different location. It takes three arguments; source, destination, and force. Some validation is done on the source & destination arguments, the application checks whether the source & destination reside on a file share on the NAS. If this is not the case, the application will throw an exception stating that the "Share <name> doesn't exists".

This validation is implemented in the get_share_and_file_path_from_id method (/usr/lib/python2.7/site-packages/unicorn/adaptors/ This method only looks at the first part of the provided path and is thus trivial to bypass using directory traversal. When the force parameter is set to true the destination file will be overwritten if it already exists.


class General(v5General):
# This function does only an atomic move
# The option 'force' allows to override existing files
# The path inside the app : <share name>/<file_path>
# The path outside the app: /media/internal_<id volume>/<id share>/<file_path>
def atomic_move(self, auth_struct, source, destination, force):

# Gets the volume id and the share id with the share name
# and converts the bindings to the local filesystem
share_source, filepath_source = get_share_and_file_path_from_id(source)
share_destination, filepath_destination = get_share_and_file_path_from_id(destination)
local_source = os.path.join(
local_destination = os.path.join(
os.rename(local_source, local_destination)

Because the endpoint is configured as public it allows for unauthenticated attackers to move arbitrary files to arbitrary locations using simple directory traversal. Since the web application runs with root privileges it is possible to move almost any file to arbitrary locations. Because the endpoint uses Python's os.rename method the destination should be on the same file system, if this is not the case os.rename will throw an Invalid cross-device link exception.
Proof of concept

The curl command below uses the atomic_move endpoint to rename the /etc/unicorn.db file, effectively disabling the management web application.

curl -i -s -k -X $'POST' \
--data-binary $'{\"source\":\"/Public/../../../../../etc/unicorn.db\", \"destination\":\"/Public/../../../../../etc/unicorn.db~\", \"force\":true}' \


RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

May 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    17 Files
  • 3
    May 3rd
    30 Files
  • 4
    May 4th
    29 Files
  • 5
    May 5th
    2 Files
  • 6
    May 6th
    3 Files
  • 7
    May 7th
    13 Files
  • 8
    May 8th
    27 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    15 Files
  • 11
    May 11th
    8 Files
  • 12
    May 12th
    2 Files
  • 13
    May 13th
    8 Files
  • 14
    May 14th
    7 Files
  • 15
    May 15th
    43 Files
  • 16
    May 16th
    19 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    3 Files
  • 20
    May 20th
    7 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    40 Files
  • 23
    May 23rd
    64 Files
  • 24
    May 24th
    55 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By