Unknown
Samsung SRN-1670D Web Viewer Version 1.0.0.193 Arbitrary File Read and Upload
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(1 user assessed)Unknown
(1 user assessed)Unknown
Unknown
Unknown
Samsung SRN-1670D Web Viewer Version 1.0.0.193 Arbitrary File Read and Upload
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted file upload vulnerability: ‘network_ssl_upload.php’ allows remote authenticated attackers to upload and execute arbitrary PHP code via a filename with a .php extension, which is then accessed via a direct request to the file in the upload/ directory. To authenticate for this attack, one can obtain web-interface credentials in cleartext by leveraging the existing Local File Read Vulnerability referenced as CVE-2015-8279, which allows remote attackers to read the web-interface credentials via a request for the cslog_export.php?path=/root/php_modules/lighttpd/sbin/userpw URI.
Add Assessment
Technical Analysis
Details
The vulnerable code can be found in network_ssl_upload.php:
22 $path = "./upload/"; 23 $file = $_FILES[ "attachFile" ]; 24 $isApply = ( int )$_POST[ "is_apply" ]; 25 $isInstall = ( int )$_POST[ "isInstall" ]; 26 $isCertFlag = ( int )$_POST[ "isCertFlag" ]; 27 28 // create socket 29 $N_message = ""; 30 $sock = mySocket_create($_is_unix_socket); 31 $connected = mySocket_connect($_is_unix_socket, $sock); 32 33 $loginInfo = new loginInfo(); 34 $retLogin = loginManager( $connected, $sock, null, $loginInfo ); 35 if ( ( $retLogin == true ) && ( $isApply == 2 || $isApply == 3 ) ) { 36 if ($connected) { 37 $id = $loginInfo->get_id(); 38 $xmlFile = $id.'_config.xml'; 39 $N_message = "dummy".nvr_command::DELIM; 40 $N_message .= "userid ".$id.nvr_command::DELIM; 41 42 if ( $isInstall == 1 ) { 43 // File upload =============================================================== 44 if ( $file[ "error" ] 0 ) { 45 $Error = "Error: ".$file[ "error" ]; 46 } else { 47 $retFile = @copy( $file[ "tmp_name" ], $path.$file[ "name" ] ); 48 } 49 // =========================================================================== 50 }
To avoid the need of authentication, the exploit also takes advantage of another vulnerability
(CVE-2015-8279) in the log exporting function to read an arbitrary file from the remote machine
in order to obtain credentials that can be used for the attack.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- hanwhasecurity
Products
- web viewer 1.0.0.193
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: