It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.

Project Subscriptions

Vendors Products
Western Digital Subscribe
My Cloud Dl2100 Subscribe
My Cloud Dl4100 Subscribe
My Cloud Dl4100 Firmware Subscribe
My Cloud Ex2 Subscribe
My Cloud Ex2100 Subscribe
My Cloud Ex2100 Firmware Subscribe
My Cloud Ex2 Firmware Subscribe
My Cloud Ex2 Ultra Subscribe
My Cloud Ex2 Ultra Firmware Subscribe
My Cloud Ex4 Subscribe
My Cloud Ex4100 Subscribe
My Cloud Ex4 Firmware Subscribe
My Cloud Mirror Subscribe
My Cloud Mirror Firmware Subscribe
My Cloud Mirror Gen 2 Subscribe
My Cloud Mirror Gen 2 Firmware Subscribe
My Cloud Pr2100 Subscribe
My Cloud Pr2100 Firmware Subscribe
My Cloud Pr4100 Subscribe
My Cloud Wdbctl0020hwt Subscribe
My Cloud Wdbctl0020hwt Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T10:39:59.564Z

Reserved: 2018-09-18T00:00:00

Link: CVE-2018-17153

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-09-18T15:29:00.307

Modified: 2024-11-21T03:53:58.427

Link: CVE-2018-17153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses