vendor:
Shadowsocks
by:
X41 D-Sec GmbH, Niklas Abel
4.39.0
CVSS
CRITICAL
Log file manipulation, Command Execution
Log file manipulation: 117; Command Execution: 78
CWE
Product Name: Shadowsocks
Affected Version From: Latest commit 2ab8c6b on Sep 6
Affected Version To: Latest commit 2ab8c6b on Sep 6
Patch Exists: NO
Related CWE: not yet issued
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Network
2017
Multiple Vulnerabilities in Shadowsocks
Log file manipulation is possible with a manipulated hostname, sent to the server from a client, even if Shadowsocks is as quiet as possible with '-qq'. Therefore a string like 'I could be any log entry' could be sent as hostname to Shadowsocks. The server would log an additional line with 'I could be any log entry'. Command execution is possible with a manipulated hostname, sent to the server from a client. Therefore a string like ';touch /tmp/x41' could be sent as hostname to Shadowsocks. The server would execute the command 'touch /tmp/x41'.
Mitigation:
There is no workaround available, do not trust the logfiles until a patch is released.