vendor:
ENC-400
by:
Security Researcher
9.8
CVSS
CRITICAL
Command injection
78
CWE
Product Name: ENC-400
Affected Version From: v2.56
Affected Version To: v2.57
Patch Exists: YES
Related CWE: CVE-2018-20218
CPE: o:teracue:enc-400
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2018
Command injection in login form
The login form passes user input directly to a shell command without any kind of escaping or validation. In the file /usr/share/www/check.lp: #!/usr/bin/env cgilua.cgi <% local pass = cgilua.POST.password local com1 = os.execute("echo '"..cgilua.POST.password.."' | (su -c /bin/true)") An attacker is able to perform command injection using the "password" parameter displayed on the login form. An example "password" to bypass this authentication would be: f' > /dev/null # It is also possible for an attacker to simply execute code directly on the server.
Mitigation:
Upgrade to the latest version of the firmware.