vendor:
Arkeia Appliance
by:
xistence
7,5
CVSS
HIGH
Unauthenticated firmware upload, Local File Inclusion (LFI)
264, 98
CWE
Product Name: Arkeia Appliance
Affected Version From: v10.0.10 and lower
Affected Version To: v10.0.10 and lower
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Virtual Appliance - ESXi 5.1
2013
Western Digital Arkeia Appliance v10.0.10
There are no restrictions when a POST request is send to http://<IP>/scripts/upload.php thus allowing any unauthenticated client to upload any data to the /tmp/ApplianceUpdate file. By sending a request (without the need for authentication) to the homepage of the appliance with a cookie "lang=../../../../../../../../../../../../../../../../etc/passwd%00", it's possible to read files on the server, in this example /etc/passwd.
Mitigation:
Upgrade to version 10.1.10