{ "Name": "TerraMaster TOS Information Disclosure (CVE-2020-28185)", "Description": "

Based on a web interface, the TerraMaster Operating System (TOS) is the operating system designed for TNAS devices. With TOS, you can quickly and easily complete the following tasks:Modify system settings;Install and open applications;Manage TNAS storage space;

There is a information disclosure vulnerability in TOS.An attacker can exploit this vulnerability to obtain sensitive information on a website.

", "Product": "TerraMaster TOS", "Homepage": "https://www.terra-master.com/", "DisclosureDate": "2022-03-01", "Author": "AnMing", "FofaQuery": "app=\"TERRAMASTER-NAS\" || banner=\"X-Powered-By=TerraMaster\"", "GobyQuery": "app=\"TERRAMASTER-NAS\" || banner=\"X-Powered-By=TerraMaster\"", "Level": "1", "Impact": "

There is a information disclosure vulnerability in TOS.An attacker can exploit this vulnerability to obtain sensitive information on a website.

", "Recommendation": "

The manufacturer has provided the vulnerability patching solution, please pay attention to the manufacturer's homepage for timely updates: https://www.terra-master.com /

1. Set access policies and whitelist access through security devices such as firewalls.

2. If not necessary, prohibit public network access to the system.

", "References": [ "https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/" ], "Translation": { "CN": { "Name": "TerraMaster TOS 信息泄露漏洞(CVE-2020-28185)", "Product": "TerraMaster TOS", "VulType": [ "信息泄露" ], "Tags": [ "信息泄露" ], "Description": "

TOS (TerraMaster Operating System) 是专门为 TNAS 设备设计的基于网页界面的操作系统。通过 TOS,您可以快速方便地进行修改系统设置、安装及打开应用程序、管理TNAS的存储空间等操作

TOS Web界面操作系统存在信息泄露漏洞,攻击者可利用该漏洞获取网站敏感信息。

", "Impact": "

TOS Web界面操作系统存在信息泄露漏洞,攻击者可利用该漏洞获取网站敏感信息。

", "Recommendation": "

厂商尚已提供漏洞修补方案,请关注厂商主页及时更新:https://www.terra-master.com/

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、如⾮必要,禁⽌公⽹访问该系统。

" } }, "Is0day": false, "HasExp": true, "ExpParams": [ { "name": "userName", "type": "input", "value": "admin", "show": "" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [ "username|lastbody|regex|admin" ] } ], "ExploitSteps": [ "" ], "Tags": [ "information-disclosure" ], "VulType": [ "information-disclosure" ], "CVEIDs": [ "CVE-2020-28185" ], "CNNVD": [ "CNNVD-202012-1551" ], "CNVD": [ "CNVD-2020-28185" ], "CVSSScore": "5.3", "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null } }