Vulnerability Note VU#326830

NAS4Free version 9.1.0.1 contains a remote command execution vulnerability

Original Release date: 30 Oct 2013 | Last revised: 30 Oct 2013

Overview

NAS4Free version 9.1.0.1.804 and possibly earlier versions contain a remote code execution vulnerability (CWE-94).

Description

CWE-94: Improper Control of Generation of Code ('Code Injection')

NAS4Free version 9.1.0.1.804 and possibly earlier versions contain a remote code execution vulnerability. NAS4Free allows an authenticated user to post PHP code to an HTTP script and have the code executed remotely. By default, NAS4Free runs with root privileges. A remotely authenticated attacker can send an HTTP POST request that contains a malicious PHP file which can cause the script to run directly on the machine.

For more details, please see Tod Beardsley's Rapid7 blog post.

Impact

A remote authenticated attacker may be able to execute arbitrary code as root on the system.

Solution

We are currently unaware of a practical solution to this problem.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
NAS4FreeAffected08 Oct 201328 Oct 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.0 AV:N/AC:M/Au:S/C:P/I:P/A:P
Temporal 5.1 E:POC/RL:U/RC:UR
Environmental 1.3 CDP:ND/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Tod Beardsley and Brandon Perry of Rapid7, Inc. for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

  • CVE IDs: CVE-2013-3631
  • Date Public: 30 Oct 2013
  • Date First Published: 30 Oct 2013
  • Date Last Updated: 30 Oct 2013
  • Document Revision: 28

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.