search menu icon-carat-right cmu-wordmark

CERT Coordination Center

QNAP Signage Station and iArtist Lite contain multiple vulnerabilities

Vulnerability Note VU#444472

Original Release Date: 2016-02-25 | Last Revised: 2016-02-25

Overview

The QNAP Signage Station prior to version 2.0.1 and the accompanying iArtist Lite application contain multiple vulnerabilities.

Description

CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2015-6022

An authenticated attacker without administrative permissions may upload a malicious file, such as a PHP script, to the QNAP Signage Station server. The attacker is then able to access the uploaded file via a predictable URL and execute the script. The script is executed on the server with administrator permissions.

CWE-290: Authentication Bypass by Spoofing - CVE-2015-6036

An unauthenticated attacker may spoof an HTTP request to the QNAP Signage Station in such a manner as to bypass authentication, allowing the attacker to perform actions such as upload files.

CWE-798: Use of Hard-coded Credentials - CVE-2015-7261
CWE-523: Unprotected Transport of Credentials

QNAP iArtist Lite contains a hard-coded FTP account and password, and uses these credentials to communicate with Signage Station. FTP transmits all data in plain text and is not secure from attackers eavesdropping on the network.

CWE-427: Uncontrolled Search Path Element - CVE-2015-7262

QNAP iArtist Lite allows a user to register a binary with the iArtist service, which will be executed with SYSTEM privileges upon next system restart.

Impact

An unauthenticated user may be able to execute commands on the server with system privileges.

Solution

Apply an update

QNAP has released Signage Station 2.0.1 and iArtist Lite 1.4.54 to address this issue. Affected users are encouraged to update as soon as possible.

Vendor Information

444472
 
Affected   Unknown   Unaffected

QNAP

Notified:  September 23, 2015 Updated:  October 16, 2015

Statement Date:   September 25, 2015

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal 7.4 E:F/RL:OF/RC:C
Environmental 5.6 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Mark Woods for reporting these vulnerabilities.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2015-6022, CVE-2015-6036, CVE-2015-7261, CVE-2015-7262
Date Public: 2016-02-25
Date First Published: 2016-02-25
Date Last Updated: 2016-02-25 18:16 UTC
Document Revision: 60

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.