exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WD ShareSpace 2.3.02 Information Disclosure

WD ShareSpace 2.3.02 Information Disclosure
Posted Jun 19, 2012
Authored by V. Paulikas | Site sec-consult.com

WD ShareSpace versions 2.3.02 and below suffer from a remote sensitive data disclosure vulnerability.

tags | advisory, remote
SHA-256 | 2ff30788aee07286ddd4c6f580352e236991687d8162d3125603f64f55c1b35d

WD ShareSpace 2.3.02 Information Disclosure

Change Mirror Download
SEC Consult Vulnerability Lab Security Advisory < 20120618-0 >
=======================================================================
title: WD ShareSpace WEB GUI Sensitive Data Disclosure
product: WD ShareSpace network storage system
vulnerable version: WD ShareSpace <= v2.3.02 (D and E series)
fixed version: none
impact: High
homepage: http://support.wdc.com/product/download.asp?groupid=901&sid=107&lang=en
found: 2012-01-31
by: V. Paulikas
SEC Consult Vulnerability Lab
https://www.sec-consult.com
=======================================================================

Vendor description:
-------------------
WD ShareSpace is high-speed network-attached storage system with capacities up
to 8 TB and a space-saving footprint gives you all the benefits of a big time
data center without the need for a big time IT department. Perfect for
centralizing and sharing data and multimedia files on a small office or home
network.

Source: http://www.wdc.com/wdproducts/library/AAG/ENG/4178-705023.pdf



Vulnerability overview/description:
-----------------------------------
WD ShareSpace network storage system has a built-in WEB GUI that is used to
administer the ShareSpace device. The built-in WEB GUI is prone to a sensitive
data disclosure due to an improper configuration of access rights of the
configuration file config.xml. By directly accessing the config.xml file
without authentication it is possible to obtain system's configuration data,
which includes network settings, shared folder names, SMB users and hashed
passwords, administrator's credentials, etc.


Proof of concept:
-----------------
The vulnerability is exploited by accessing the config.xml file directly with
a browser.

PoC URL has been removed as no vendor patch is available.


Vulnerable / tested versions:
-----------------------------
WD ShareSpace v2.3.01



Vendor contact timeline:
------------------------
2012-02-17: Contacting vendor through help center
(http://wdc.custhelp.com/app/ask/).
2012-02-24: Vendor response, issue is being forwarded to the appropriate
product development team (Level 2 team as by WD) for review and
confirmation. Case 120217-002268 opened.
2012-03-02: Vendor response, issue has been reviewed, additional information
required.
2012-03-07: Providing additional information regarding the vulnerability.
2012-03-12: Vendor response, vulnerability escalated to their engineering team
to verify and fix if possible.
2012-04-19: Asking if the vulnerability was fixed because of long response
time.
2012-04-24: Vendor response, vulnerability not resolved.
2012-05-03: Vendor response, firmware update available, not related to
vulnerability
2012-05-07: Asking vendor to recheck if firmware update really
solves the problem.
2012-05-09: Vendor confirms, that the new firmware does not solve the problem.
2012-05-10: Asking vendor for more indepth research of the issue
2012-05-15: Vendor confirms the issue: ShareSpace running firmware version
2.3.02 (D and E series) is affected.
Vendor disagrees that it's a security vulnerability.
2012-05-31: Informing vendor about the release of the advisory on 2012-06-18.
No answer.
2012-06-11: Informing vendor once more about the release of advisory on
2012-06-18. No answer.
2012-06-18: No further response from vendor. Advisory published according to
the SEC Consult's responsible disclosure policy.



Solution:
---------
No patch available.


Workaround:
-----------
Allow access to the administrative interface only from trusted networks.



Advisory URL:
-------------
https://www.sec-consult.com/en/advisories.html


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
https://www.sec-consult.com

EOF V. Paulikas / @2012
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close