- Notifications
You must be signed in to change notification settings - Fork11
bnbdr/wd-rce
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
Tested onWD My Cloud EX2 Ultra
versions2.31.149 and2.31.163.Should work on other MyCloud models.
for the write-up gohere.
Authentication bypass to acquire user-session (CVE-2019-9950)
login_mgr.cgi
matches credentials against/etc/shadow
, therefore the"nobody"
account can be used to gain a low-privilege user session by providing "nobody"'sdefault, empty password.
Root-RCE using low-privilege session (CVE-2019-9949)
cgi-bin/webfile_mgr.cgi
allows an attacker in the same network to performcommand injection by abusing the"name"
parameter to thecgi_unzip
command.cgi-bin/webfile_mgr.cgi
allows an attacker in the same network to issue thecgi_untar
command on a user-controlled archive to create a persistentsymbolic link on the filesystem whichcan be written into by issuing the command again.
Unauthenticated file upload (CVE-2019-9951)
The pageweb/jquery/uploader/uploadify.php
can be accesses without any credentials and allowsuploading arbitrary files to any location on the attached storage under either:
/mnt/HD
/mnt/USB
/mnt/isoMount
- 2019-01-20 🍄 reported topsirt@wdc.com with 30-day deadline
- 2019-01-22
ᴡᴅ
sent an automated(?) response - 2019-02-05 🍄 requested comfirmation of issues
- 2019-02-06
ᴡᴅ
asked for 90 days to fix the issues - 2019-03-05 🍄 requested status update
- 2019-03-15
ᴡᴅ
asked foradditional 90-day extension - 2019-03-16 🍄 agreed on 30-day extension
- 2019-03-27
ᴡᴅ
released first patch (CVE-2019-9950, CVE-2019-9951) - 2019-05-20
ᴡᴅ
release of second patch (CVE-2019-9949) - 2019-05-22 🍄 public disclosure