vendor:
Seagate Central
by:
Jeremy Brown
7.5
CVSS
HIGH
Passwordless root account
259
CWE
Product Name: Seagate Central
Affected Version From: 2014.0410.0026-F
Affected Version To: 2014.0410.0026-F
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2015
Seagate Central Remote Root Exploit
Seagate Central by default has a passwordless root account (and no option to change it). One way to exploit this is to log into it's ftp server and upload a php shell to the webroot. From there, we can execute commands with root privileges as lighttpd is also running as root.
Mitigation:
Seagate scheduled it's updates to go live on April 28th, 2015.