vendor:
NAS
by:
pws
7.5
CVSS
HIGH
Hardcoded cookie to access the admin section, Authentication bypass
311
CWE
Product Name: NAS
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: None yet
CPE: a:lian-li:nas
Platforms Tested: Unknown
2014
Lian Li NAS Multiple vulnerabilities
1. Hardcoded cookie to access the admin section: The file storlib.js contains a function get_cookie() which checks for the presence of a hardcoded cookie 'LoginUser=admin' in the document's cookies. If the cookie is not found, it redirects to the index.html page. This allows an attacker to bypass authentication by setting the cookie manually.2. Authentication bypass: By creating the cookie 'LoginUser=admin' and accessing specific URLs, an attacker can gain access to admin features such as enabling/disabling the Telnet server and managing users.
Mitigation:
The vendor should remove the hardcoded cookie check and implement proper authentication mechanisms. Users should update to the latest firmware version to mitigate these vulnerabilities.