Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-14699 PoC — Drobo 5N2 NAS 命令注入漏洞

Source
Associated Vulnerability
Title:Drobo 5N2 NAS 命令注入漏洞 (CVE-2018-14699)
Description:Drobo 5N2 NAS是美国Drobo公司的一款网络存储设备(NAS)。该设备具有数据共享、数据备份、远程访问和灾备恢复等功能。 Drobo 5N2 NAS 4.0.5-13.28.96115版本中的/DroboAccess/enable_user端点存在命令注入漏洞。攻击者可借助‘username’URL参数利用该漏洞执行系统命令。
Description
Unauthenticated Blind Command injection in the enable_user function of DroboAccess v 2.1
Readme
# CVE-2018-14699
### UnAuth Command injection in the enable_user function of DroboAccess v2.1
-----
# Usage: 
- To use First startup a listener (ncat -nvlp 1337)
- Next run the exploit

  - example: exploit.py -t 192.168.1.122:8080 -l 192.168.1.2 -p 1337
  
  '-t', '--target', help='host for exploitation, ex. 192.168.1.122:8080',required=True
  
  '-l', '--listener-ip', help='listener IP', required=True
  
  '-p', '--port', help='port number of the listener', required=True

# Description:

CVE-2018-14699 is a blind command injection vulnerability in DroboAccess v2.1. The issue is here because the enable_user function takes the username parameters as user input then calls a dependency that executes a shell directly without any sanatization. I clearify this as there doesn't appear to be another reference of this anywhere. So again this is not a vulnerability in Drobo 5N2 rather a vulnerability in DroboAccess. This has been tested on a B810n with success.

# Details

The script will make an attempt to echo a script to a file called revshell in the current working directly. If this is successful, it will then attempt to call it with bash as the executable, making a connection back to your listener with bash!

# Resources:

- https://blog.securityevaluators.com/call-me-a-doctor-new-vulnerabilities-in-drobo5n2-4f1d885df7fc
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14699
File Snapshot

[4.0K] /data/pocs/0b248e12c9a5dbdb4f0a143cdc6e2a5fa3632093 ├── [1.9K] exploit.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.