Date: Thu, 15 May 2014 18:56:02 +0300 From: Dolev Farhi <dolevf87@...il.com> To: cve-assign <cve-assign@...re.org>, oss-security <oss-security@...ts.openwall.com> Subject: OpenFiler - Arbitrary Code Execution & Stored XSS hi, Multiple vulnerabilities were discovered in the latest version of OpenFiler appliance, 2.99.1 as reported here<https://forums.openfiler.com/index.php?/topic/6720-arbitrary-code-execution-stored-xss-vulnerability-in-openfiler-latest-version-2991/>, here <http://www.exploit-db.com/exploits/33247> and here<http://www.exploit-db.com/exploits/33248> OpenFiler is a FreeNAS appliance equivalent. - Vulnerability 1 OpenFiler is vulnerable to an arbitrary code execution attack by not validating the hostname input, this vulnerability allows an attacker to execute any system shell command with the root user privileges. - Proof of concept: i. Login with any available user ii. Change the hostname value to `cat /etc/passwd` iii. Submit * Refreshing the screen / Reloading the page results with passwd content in the OpenFiler system hostname value. - Vulnerability 2 Multiple Stored XSS were found in OpenFiler, by creating a volume group or a network access configuration with malicious code e.g. <script>alert("css")</script> any user attempt to create, view or modify volume shares executes the attack. Proof of concept vids 1. Link 1 <http://research.openflare.org/poc/openfiler/codexec.mp4> 2. Link 2 <http://research.openflare.org/poc/openfiler/xss.mp4> Can CVEs please be assigned to these issues? Tx
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.