module
Syncovery For Linux Web-GUI Authenticated Remote Command Execution
Disclosed | Created |
---|---|
2022-09-06 | 2022-12-14 |
Disclosed
2022-09-06
Created
2022-12-14
Description
This module exploits an authenticated command injection vulnerability in the Web GUI of Syncovery File Sync & Backup Software for Linux.
Successful exploitation results in remote code execution under the context of the root user.
Syncovery allows an authenticated user to create jobs, which are executed before/after a profile is run.
Jobs can contain arbitrary system commands and will be executed as root.
A valid username and password or a session token is needed to exploit the vulnerability.
The profile and its log file will be deleted afterwards to disguise the attack.
The vulnerability is known to work on Linux platforms. All Syncovery versions prior to v9.48j are vulnerable including all versions of branch 8.
Successful exploitation results in remote code execution under the context of the root user.
Syncovery allows an authenticated user to create jobs, which are executed before/after a profile is run.
Jobs can contain arbitrary system commands and will be executed as root.
A valid username and password or a session token is needed to exploit the vulnerability.
The profile and its log file will be deleted afterwards to disguise the attack.
The vulnerability is known to work on Linux platforms. All Syncovery versions prior to v9.48j are vulnerable including all versions of branch 8.
Author
Jan Rude
Platform
Unix
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.