module

QNAP QTS and Photo Station Local File Inclusion

Disclosed
Nov 25, 2019
Created
Jun 11, 2020

Description

This module exploits a local file inclusion in QNAP QTS and Photo
Station that allows an unauthenticated attacker to download files from
the QNAP filesystem.

Because the HTTP server runs as root, it is possible to access
sensitive files, such as SSH private keys and password hashes.

This module has been tested on QTS 4.3.3 (unknown Photo Station
version) and QTS 4.3.6 with Photo Station 5.7.9.

Authors

Henry Huang
Redouane NIBOUCHA [email protected]

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use auxiliary/gather/qnap_lfi
msf auxiliary(qnap_lfi) > show actions
...actions...
msf auxiliary(qnap_lfi) > set ACTION < action-name >
msf auxiliary(qnap_lfi) > show options
...show and set options...
msf auxiliary(qnap_lfi) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.