Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-17153

EPSS 91.95% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-17153

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Western Digital My Cloud 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Western Digital My Cloud是美国西部数据(Western Digital)公司的一款个人网络云存储设备。 Western Digital My Cloud 2.30.x及之前版本中存在身份验证绕过漏洞。攻击者可利用该漏洞无需密码以admin用户身份通过身份验证或无需登录便可创建有效的会话。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-17153

#POC DescriptionSource LinkShenlong Link
1It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called \"cgi_get_ipv6\" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter \"flag\" with the value \"1\" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-17153.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-17153

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-09-18 · 31 CVEs total

CVE-2018-17178Neato Botvac Connected 安全漏洞
CVE-2018-17111Coinlancer 安全漏洞
CVE-2018-17071Lucky9io 安全漏洞
CVE-2018-16820Monstra CMS 路径遍历漏洞
CVE-2018-16819Monstra CMS 安全漏洞
CVE-2018-16794Microsoft Active Directory Federation Services 安全漏洞
CVE-2018-16515Matrix Synapse 安全漏洞
CVE-2018-16225Askey QBee MultiSensor Camera 授权问题漏洞
CVE-2018-15546Accusoft PrizmDoc 跨站脚本漏洞
CVE-2018-13982New Digital Group Smarty 路径遍历漏洞
CVE-2018-16671CIRCONTROL CirCarLife 信息泄露漏洞
CVE-2018-16670CIRCONTROL CirCarLife 安全漏洞
CVE-2018-16669CirCarLife和PowerStudio CIRCONTROL Open Charge Point Protocol 安全漏洞
CVE-2018-16668CIRCONTROL CirCarLife
CVE-2017-6913Open-Xchange webmail 跨站脚本漏洞
CVE-2018-1000802Python 命令注入漏洞
CVE-2018-17177Neato Robotics Botvac Connected和Neato Robotics Botvac 85 加密问题漏洞
CVE-2018-17176Neato Botvac Connected 授权问题漏洞
CVE-2018-11300Android Qualcomm WLAN Host 安全漏洞
CVE-2018-11286Android Video 安全漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-17153

No comments yet


Leave a comment