exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Restorepoint 3.2-Evaluation Remote Root Command Execution

Restorepoint 3.2-Evaluation Remote Root Command Execution
Posted Dec 8, 2011
Authored by Tavaris Desamito | Site trustmatta.com

The 3.2 evaluation image of Restorepoint is vulnerable to a remote command execution vulnerability in the remote_support.cgi script prior to license activation.

tags | exploit, remote, cgi
advisories | CVE-2011-4201, CVE-2011-4202
SHA-256 | 2ba071b3366e0b276ade67905a48b2cefde4a0fc3b57bab0aa5fac1af8e646c1

Restorepoint 3.2-Evaluation Remote Root Command Execution

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Matta Consulting - Matta Advisory
https://www.trustmatta.com
Restorepoint Remote root command execution vulnerability

Advisory ID: MATTA-2011-003
CVE reference:
CVE-2011-4201 - Code injection vulnerability
CVE-2011-4202 - Privilege escalation through insecure file permissions
Affected platforms: Tadasoft Restorepoint
Version: 3.2-evaluation
Date: 2011-October-20
Security risk: Critical
Vulnerability: Remote root command execution
Researcher: Tavaris Desamito
Vendor Status: Notified, Patch available
Vulnerability Disclosure Policy:
https://www.trustmatta.com/advisories/matta-disclosure-policy-01.txt
Permanent URL:
https://www.trustmatta.com/advisories/MATTA-2011-003.txt

=====================================================================
Introduction:

Restorepoint is a network appliance backup and disaster recovery system
from Tadasoft.
More information can be found on the following page:
http://www.restorepoint.com/restorepoint/

=====================================================================
Vulnerability:

The 3.2 evaluation image of Restorepoint is vulnerable to a remote
command
execution vulnerability in the remote_support.cgi script prior to
license
activation. By supplying a semi colon followed by a unix shell command
to
the pid1 or pid2 parameters in conjunction with the stop_remote_support
parameter, an unauthenticated remote attacker can execute commands on
the
Restorepoint appliance with the privileges of the www user. The Common
Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2011-4201 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org), which standardizes names for
security
problems.

Given that the Restorepoint appliance uses a Linux kernel compiled in
2009, obtaining root access is trivial.

Furthermore, Restorepoint uses sudo in order to run a number of scripts
with
root access. As a large number of these scripts can be modified by the
www
user, root access can be obtained directly through Restorepoint
functionality, without relying on additional exploits. The Common
Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2011-4202 to this issue.

=====================================================================
Impact:

Anyone who is able to connect to Restorepoint on port 443 between
powering up
the appliance and before the appliance is license activated is able to
obtain
root level shell access to the appliance.

The Restorepoint appliance is used to back up the configurations of
network
devices and as such, the Restorepoint appliance holds credentials for
all the
devices it backs up; Which in most cases will be privileged accounts
that will
allow reconfiguration of the network devices.

If someone was able to compromise the security of the Restorepoint
appliance
in the period between powering up the appliance and before the
appliance is
license activated, an attacker is then able to go on to compromise the
security of all devices backed up by Restorepoint.

Having achieved this, an attacker may reposition and begin to compromise
the
rest of the network by using the Restorepoint appliance to launch
further
attacks.

=====================================================================
Versions affected:

Version 3.2 - evaluation image
The vendor reports that they maintain different trees for evaluation and
licensed copies of their software. The version available to licensed
customers
is not vulnerable to this issue. Moreover, all appliances including
evaluations use a built-in auto-update mechanism upon license
activation
that downloads additional software components and security updates
which
ensures their customers are using the latest version of the product.
The
vendor reports that the evaluation image would have been patched if the
evaluation license had been applied.

Matta have not confirmed this at this stage.

=====================================================================
Threat mitigation:

Anyone with evaluation versions of Restorepoint prior to 3.2 should
activate
the license, at which point the software is automatically updated.

Matta suggests that affected parties running this version of the
software
restrict access to port 443 on their Restorepoint appliances to only
allow
trusted administrators to connect.

The vendor reports that the latest version available evaluation image
(3.3) is not vulnerable to this issue. Moreover, the vendor reports
that
the 3.2 evaluation image would have been patched if an evaluation
license
was applied.

In this case, Matta recommends that users activate their appliance to be
able to download the necessary software components and security
updates.

=====================================================================
Credits

This vulnerability was discovered and researched by Tavaris Desamito
from
Matta Consulting.

=====================================================================
History

20-10-11 initial discovery
24-10-11 initial attempt to contact the vendor
24-10-11 vendor response received and draft advisory supplied
25-10-11 vendor feedback received
14-11-11 advisory draft updated
... more interactions with the vendor
04-12-11 advisory draft updated
07-12-11 public disclosure

=====================================================================
About Matta

Matta is a privately held company with Headquarters in London, and a
European
office in Amsterdam. Established in 2001, Matta operates in Europe,
Asia,
the Middle East and North America using a respected team of senior
consultants. Matta is an accredited provider of Tiger Scheme training,
conducts regular research and is the developer behind the webcheck
application scanner, and colossus network scanner.
https://www.trustmatta.com
https://www.trustmatta.com/webapp_va.html
https://www.trustmatta.com/network_va.html
https://www.trustmatta.com/training.html

=====================================================================
Disclaimer and Copyright

Copyright (c) 2011 Matta Consulting Limited. All rights reserved.
This advisory may be distributed as long as its distribution is
free-of-charge and proper credit is given.
The information provided in this advisory is provided "as is" without
warranty of any kind. Matta Consulting disclaims all warranties, either
express or implied, including the warranties of merchantability and
fitness
for a particular purpose. In no event shall Matta Consulting or its
suppliers be liable for any damages whatsoever including direct,
indirect,
incidental, consequential, loss of business profits or special damages,
even if Matta Consulting or its suppliers have been advised of the
possibility of such damages.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQEcBAEBAgAGBQJO35HHAAoJEKXMIWKFD6qpSrUH/ApJ7WgGlWPEX6pCQTkG36m/
xTkIaLGCaUyA+mkQ4MmHtBjNvd+rgA8B4V/gXOl4n6Cq2OwpuPhIO4ZFZWlKORiU
JMp93glgp96TeozqlR8P+J9zJ+6gJCOtQm74lQkXbd1P914/7PpedOp845/HgA7M
RCsvDDJ4WL2BwOeQAnWWeSYnEOuKiJFZbeRPeIm3dLqsDCy9i9hRdBEdZN5433c5
jzBgF4zSuBn/8B5ebpfnQTqojxPeuasJ6Hfa9cCk71pE1hla2bfc5hcv8XjGavug
IqxWhYyAiyejQfVESf+FVRdhBr8ypz8IzeBlzImyTWZuowMPtP9yZoEQBc7CHgo=
=LnHW
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close