Rapid7 Vulnerability & Exploit Database

Syncovery For Linux Web-GUI Authenticated Remote Command Execution

Back to Search

Syncovery For Linux Web-GUI Authenticated Remote Command Execution

Disclosed
09/06/2022
Created
12/14/2022

Description

This module exploits an authenticated command injection vulnerability in the Web GUI of Syncovery File Sync & Backup Software for Linux. Successful exploitation results in remote code execution under the context of the root user. Syncovery allows an authenticated user to create jobs, which are executed before/after a profile is run. Jobs can contain arbitrary system commands and will be executed as root. A valid username and password or a session token is needed to exploit the vulnerability. The profile and its log file will be deleted afterwards to disguise the attack. The vulnerability is known to work on Linux platforms. All Syncovery versions prior to v9.48j are vulnerable including all versions of branch 8.

Author(s)

  • Jan Rude

Platform

Unix

Architectures

cmd

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/http/syncovery_linux_rce_2022_36534
msf exploit(syncovery_linux_rce_2022_36534) > show targets
    ...targets...
msf exploit(syncovery_linux_rce_2022_36534) > set TARGET < target-id >
msf exploit(syncovery_linux_rce_2022_36534) > show options
    ...show and set options...
msf exploit(syncovery_linux_rce_2022_36534) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;