SB2020122414 - Multiple vulnerabilities in TerraMaster TOS
Published: December 24, 2020 Updated: June 10, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2020-28188)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the "Event" parameter in "/include/makecvs.php". A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Improper access control (CVE-ID: CVE-2020-29189)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote authenticated attacker can bypass read-only restriction and obtain full access to any folder within the NAS.
3) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2020-28190)
The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.
The vulnerability exists due to the affected software update and applications are checked and delivered via un-encrypted communication channel (HTTP). A remote attacker can perform perform a man-in-the-middle attack and update the target software.
4) Path traversal (CVE-ID: CVE-2020-28187)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences within several parameters. A remote authenticated attacker can send a specially crafted HTTP request and read, edit or delete any file within the filesystem.
This vulnerability affects the following parameters:
- "filename" in /tos/index.php?editor/fileGet
- "Event" in /include/ajax/logtable.php,
- "opt" in /include/core/index.php
5) Weak Password Recovery Mechanism for Forgotten Password (CVE-ID: CVE-2020-28186)
The vulnerability allows a remote attacker to takeover the account.
The vulnerability exists due to the email injection in the forget password functionality. A remote attacker can achieve account takeover.
6) Information disclosure (CVE-ID: CVE-2020-28185)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to email injection in the "username" parameter in "wizard/initialise.php". A remote attacker can identify valid users within the system.
7) Cross-site scripting (CVE-ID: CVE-2020-28184)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the "mod" parameter in "/module/index.php". A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.