Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVE/CVE-2019-18929/description.txt
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
81 lines (81 sloc)
1.97 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| > Western Digital | |
| > My Cloud EX2 Ultra | |
| > 2.31.183 | |
| > allows web users (including guest accounts) to | |
| > remotely execute arbitrary code via a | |
| > download_mgr.cgi | |
| > stack-based buffer overflow. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Additional Information] | |
| > 0x62626262 in ?? () | |
| > gdb-peda$ info registers | |
| > r0 0x9 0x9 | |
| > r1 0x1 0x1 | |
| > r2 0x1 0x1 | |
| > r3 0xf64c0a80 0xf64c0a80 | |
| > r4 0x61616161 0x61616161 | |
| > r5 0x61616161 0x61616161 | |
| > r6 0x112c8 0x112c8 | |
| > r7 0x0 0x0 | |
| > r8 0x0 0x0 | |
| > r9 0xf67cc0f4 0xf67cc0f4 | |
| > r10 0xf67fe000 0xf67fe000 | |
| > r11 0x0 0x0 | |
| > r12 0x269c4 0x269c4 | |
| > sp 0xf6fff2b8 0xf6fff2b8 | |
| > lr 0x62626262 0x62626262 | |
| > pc 0x62626262 0x62626262 | |
| > cpsr 0x20000010 0x20000010 | |
| > gdb-peda$ | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vulnerability Type] | |
| > Buffer Overflow | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vendor of Product] | |
| > Western Digital | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Product Code Base] | |
| > WD My Cloud EX2 Ultra - 2.31.183 | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Component] | |
| > download_mgr.cgi | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Type] | |
| > Remote | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Impact Code execution] | |
| > true | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Vectors] | |
| > To execute arbitrary code, web users access to the vulnerable cgi file with malicious parameters. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Has vendor confirmed or acknowledged the vulnerability?] | |
| > true | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Discoverer] | |
| > DelspoN & Jeong Jae Young | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Reference] | |
| > https://support.wdc.com/downloads.aspx?g=907&lang=en |