The article «QNAP QTS — QNAPping At The Wheel (CVE-2024-27130 and friends)» from WatchTowr Labs provides a detailed analysis of several vulnerabilities found in QNAP NAS devices. CVE-2024-27130. Stack Buffer Overflow in share.cgi: The vulnerability arises from the unsafe use of the strcpy function in the No_Support_ACL function, which is accessible via the get_file_size function in share.cgi. This leads to a stack buffer overflow, which can be exploited to achieve Remote Code Execution (RCE). Attack Scenario: 📌Step 1: Initial Access: An attacker needs a valid NAS user account to exploit this vulnerability. This could be achieved through phishing, credential stuffing, or exploiting another vulnerability to gain initial access. 📌Step 2: File Sharing: The attacker shares a file with an untrusted user. This action triggers the get_file_size function in share.cgi. 📌Step 3: Exploitation: The get_file_size function calls No_Support_ACL, which uses strcpy unsafely, leading to a stack buffer
CVE-2024-27130 in QNAP: When 'Secure' is Just a Marketing Term
19 июля 202419 июл 2024
1 мин