SSD Advisory – Remote Command Execution in Western Digital with Dropbox App
Credit to Author: SSD / Maor Schwartz| Date: Wed, 30 Aug 2017 02:39:13 +0000
Want to get paid for a vulnerability similar to this one?
Contact us at: sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom
Vulnerability summary
The following advisory describes an unauthenticated Remote Command Execution vulnerability in My Cloud products with that has Dropbox App installed.
The My Passport, My Book, and My Cloud (Single-Bay) drives allow users to backup their data to an existing Dropbox account using WD SmartWare Pro, WD Backup. The My Cloud Dropbox App (Available on the multi-bay My Cloud drives) allows a user to sign-in to their Dropbox account and synchronize the data stored between the drive and Dropbox storage.
Credit
An independent security researcher, Kacper Szurek, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Vendor response
Western Digital was informed of the vulnerability, and released Dropbox v2.00 to address it.
Vulnerability details
User controlled input is not sufficiently sanitized, and then passed to a system() function. The attacker controlled input $_REQUEST[‘account’] found in dropbox.php can be exploited to gain remote command execution.
Proof of Concept
The following PoC will run the ‘ls‘ command on victim’s machine
1 | http://IP/Dropbox/php/dropbox.php?cmd=getBlacklist&account=;ls; |