lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1D56CFAF0A08451ABD3C4B6B74781E18@senseofsecurity.com.au>
Date: Mon, 18 Jun 2012 01:17:16 +1000
From: "Lists" <lists@...seofsecurity.com>
To: "Bugtraq" <bugtraq@...urityfocus.com>
Subject: QNAP Turbo NAS Multiple Vulnerabilities - Security Advisory

Sense of Security - Security Advisory - SOS-12-006

Release Date.              13-Jun-2012
Last Update.               -              
Vendor Notification Date.  12-Mar-2012
Product.                   QNAP
Platform.                  Turbo NAS (verified) and possibly others
Affected versions.         Firmware Version: 3.6.1 Build 0302T and prior
Severity Rating.           High
Impact.                    Exposure of sensitive information
                           Exposure of system information
                           Privilege escalation
                           System access
Attack Vector.             Remote with authentication
Solution Status.           Currently no software update;
                           vendor has elected not to fix at this time
CVE reference.             CVE - not yet assigned

Details.
QNAP provide NAS technology solutions to consumers and enterprises.
Multiple vulnerabilities have been identified in the web management 
interface.

1. Command Injection:
The QNAP Download Station (QDownload) is vulnerable to command injection 
as the application executes user-controllable data that is processed by 
a shell command interpreter.

The following resources, accessible post authentication are affected:
/cgi-bin/Qdownload/DS_RSS_Option.cgi [keyword parameter]
/cgi-bin/Qdownload/DS_RSS_Option.cgi [title parameter]
Commands are executed with the context of the admin user [uid=0(admin) 
gid=0(administrators] on the QNAP device.

Proof of Concept.
/cgi-bin/Qdownload/DS_RSS_Option.cgi?_dc=1331164660690&url=http%3A%2F%2F
google.com&title=test&keyword=`touch%20%2ftesto%2etxt`&todo=add&sid=i9
nonapr&ver=2.0

2. Cryptography:
The QNAP login page stores persistent cookies (including the administrator 
username and password) as base64 encoded strings inside the cookie 
parameter nas_p. These cookies are not protected with either the HTTPOnly 
or Secure flags allowing theft via one of the many cross-site scripting 
vulnerabilities which exist within the application (disclosed previously 
by another researcher, but never fixed).

Proof of Concept.
Cookie: qnap_admin_style=default; nas_save_u=1; nas_u=bGFicw==; 
nas_address=10.1.1.2; nas_save_p=1; nas_p= YWRtaW5UMG1iJTI0dDBuMw==; 
nas_tree_x=240; nas_tree_y=370
YWRtaW5UMG1iJTI0dDBuMw== decodes to admin123qweasd

Solution.
No vendor solution.

Discovered by.
Nadeem Salim and Phil Taylor from Sense of Security Labs.

About us.
Sense of Security is a leading provider of information security and 
risk management solutions. Our team has expert skills in assessment
and assurance, strategy and architecture, and deployment through to
ongoing management. We are Australia's premier application penetration 
testing firm and trusted IT security advisor to many of the country's
largest organisations.

Sense of Security Pty Ltd 
Level 8, 66 King St
Sydney NSW 2000
AUSTRALIA

T: +61 (0)2 9290 4444
F: +61 (0)2 9290 4455
W: http://www.senseofsecurity.com.au/consulting/penetration-testing
E: info@...seofsecurity.com.au
Twitter: @ITsecurityAU

The latest version of this advisory can be found at:
http://www.senseofsecurity.com.au/advisories/SOS-12-006.pdf

Other Sense of Security advisories can be found at:
http://www.senseofsecurity.com.au/research/it-security-advisories.php

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ