vendor:
Raysync
by:
XiaoLong Zhu
9.8
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Raysync
Affected Version From: Below 3.3.3.8
Affected Version To: 3.3.3.8
Patch Exists: YES
Related CWE: N/A
CPE: a:raysync:raysync
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2020
Raysync 3.3.3.8 – RCE
Raysync 3.3.3.8 is vulnerable to Remote Code Execution. An attacker can exploit this vulnerability by running RaysyncServer.sh to build a web application on the local environment, setting the admin password to 123456, which will be written to manage.db file. The attacker can then use curl to override the remote manage.db file in the server. After logging in to the admin portal with admin/123456, the attacker can create a normal file with all permissions in scope and modify RaySyncServer.sh to add arbitrary evil command. Finally, the attacker can trigger the RCE by clicking the 'reset' button.
Mitigation:
Users should update to the latest version of Raysync 3.3.3.8 to patch this vulnerability.