It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Western Digital
Subscribe
|
My Cloud Dl2100
Subscribe
My Cloud Dl4100
Subscribe
My Cloud Dl4100 Firmware
Subscribe
My Cloud Ex2
Subscribe
My Cloud Ex2100
Subscribe
My Cloud Ex2100 Firmware
Subscribe
My Cloud Ex2 Firmware
Subscribe
My Cloud Ex2 Ultra
Subscribe
My Cloud Ex2 Ultra Firmware
Subscribe
My Cloud Ex4
Subscribe
My Cloud Ex4100
Subscribe
My Cloud Ex4 Firmware
Subscribe
My Cloud Mirror
Subscribe
My Cloud Mirror Firmware
Subscribe
My Cloud Mirror Gen 2
Subscribe
My Cloud Mirror Gen 2 Firmware
Subscribe
My Cloud Pr2100
Subscribe
My Cloud Pr2100 Firmware
Subscribe
My Cloud Pr4100
Subscribe
My Cloud Wdbctl0020hwt
Subscribe
My Cloud Wdbctl0020hwt Firmware
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T10:39:59.564Z
Reserved: 2018-09-18T00:00:00
Link: CVE-2018-17153
No data.
Status : Modified
Published: 2018-09-18T15:29:00.307
Modified: 2024-11-21T03:53:58.427
Link: CVE-2018-17153
No data.
OpenCVE Enrichment
No data.
Weaknesses