module

Synology DiskStation Manager smart.cgi Remote Command Execution

Disclosed
2017-11-08
Created
2020-05-22

Description

This module exploits a vulnerability found in Synology DiskStation Manager (DSM)
versions privileges after website authentication.
The vulnerability is located in webman/modules/StorageManager/smart.cgi, which
allows appending of a command to the device to be scanned. However, the command
with drive is limited to 30 characters. A somewhat valid drive name is required,
thus /dev/sd is used, even though it doesn't exist. To circumvent the character
restriction, a wget input file is staged in /a, and executed to download our payload
to /b. From there the payload is executed. A wfsdelay is required to give time
for the payload to download, and the execution of it to run.

Authors

Nigusu Kassahun
h00die

Platform

Python

Architectures

python

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/synology_dsm_smart_exec_auth
msf exploit(synology_dsm_smart_exec_auth) > show targets
...targets...
msf exploit(synology_dsm_smart_exec_auth) > set TARGET < target-id >
msf exploit(synology_dsm_smart_exec_auth) > show options
...show and set options...
msf exploit(synology_dsm_smart_exec_auth) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.