This Metasploit module exploits a code execution flaw in Western Digital Arkeia version 11.0.12 and below. The vulnerability exists in the ‘arkeiad’ daemon listening on TCP port 617. Because there are insufficient checks on the authentication of all clients, this can be bypassed. Using the ARKFS_EXEC_CMD operation it’s possible to execute arbitrary commands with root or SYSTEM privileges. The daemon is installed on both the Arkeia server as well on all the backup clients. The module has been successfully tested on Windows, Linux, OSX, FreeBSD and OpenBSD.
Monthly Archives: July 2015
TOR Virtual Network Tunneling Tool 0.2.6.10
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
GNU Transport Layer Security Library 3.3.16
GnuTLS is a secure communications library implementing the SSL and TLS protocols and technologies around them. It provides a simple C language application programming interface (API) to access the secure communications protocols, as well as APIs to parse and write X.509, PKCS #12, OpenPGP, and other required structures. It is intended to be portable and efficient with a focus on security and interoperability.
Western Digital Arkeia 11.0.13 Remote Code Execution
Western Digital Arkeia versions 11.0.12 and below suffer from a ARKFS_EXEC_CMD remote code execution vulnerability.
HP Security Bulletin HPSBGN03373 1
HP Security Bulletin HPSBGN03373 1 – A potential security vulnerability has been identified with HP Release Control running TLS. This is the TLS vulnerability using US export-grade 512-bit keys in Diffie-Hellman key exchange known as “Logjam” which could be exploited remotely resulting in disclosure of information. Revision 1 of this advisory.
WordPress WP-SwimTeam 1.44.10777 Arbitrary File Download
WordPress WP-SwimTeam plugin version 1.44.10777 suffers from an arbitrary file download vulnerability.
Cisco Security Advisory 20150710-openssl
Cisco Security Advisory – On July 9, 2015, the OpenSSL Project released a security advisory detailing a vulnerability affecting applications that verify certificates, including SSL/Transport Layer Security (TLS)/Datagram Transport Layer Security (DTLS) clients and SSL/TLS/DTLS servers using client authentication. Multiple Cisco products incorporate a version of the OpenSSL package affected by this vulnerability that could allow an unauthenticated, remote attacker to cause certain checks on untrusted certificates to be bypassed, enabling the attacker to forge “trusted” certificates that could be used to conduct man-in-the-middle attacks. This advisory will be updated as additional information becomes available. Cisco will release free software updates that address this vulnerability. Workarounds that mitigate this vulnerability may be available.
Gentoo Linux Security Advisory 201507-12
Gentoo Linux Security Advisory 201507-12 – A buffer overflow in libcapsinetwork might allow remote attackers to cause a Denial of Service condition. Versions less than or equal to 0.3.0-r2 are affected.
HP Security Bulletin HPSBGN03351 2
HP Security Bulletin HPSBGN03351 2 – Potential security vulnerabilities have been identified with HP IceWall SSO Dfw, SSO Certd, MCRP, and Federation Agent running OpenSSL. This is the TLS vulnerability known as “Logjam”, which could be exploited remotely to allow disclosure of information. Revision 2 of this advisory.
ZenPhoto 1.4.8 XSS / SQL Injection / Traversal
ZenPhoto version 1.4.8 suffers from cross site scripting, remote SQL injection, and path traversal vulnerabilities.