Goby/json/Terramaster-F4-210-Arbitrar...

69 lines
3.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Terramaster F4-210 Arbitrary File Read",
"Description": "<p>TerraMaster F2-210 and F4-210 are NAS (Network Attached Storage) devices of Terramaster, Shenzhen, China.</p><p>TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.</p>",
"Product": "TerraMaster F4-210",
"Homepage": "https://www.terra-master.com/cn/",
"DisclosureDate": "2022-01-04",
"Author": "1291904552@qq.com",
"FofaQuery": "title=\"TOS Loading\"",
"GobyQuery": "title=\"TOS Loading\"",
"Level": "2",
"Impact": "<p>TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://www.terra-master.com/cn/\">https://www.terra-master.com/cn/</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Terramaster 存储设备 F4-210 任意文件读取漏洞",
"VulType": ["文件读取"],
"Tags": ["文件读取"],
"Description": "<p>TerraMaster F2-210和F4-210是中国深圳市图美电子技术Terramaster公司的NAS网络附属存储设备。</p><p>TerraMaster F2-210和F4-210存在任意文件读取漏洞攻击者可通过敏感信息泄露伪造session来读取任意文件获取敏感信息。</p>",
"Impact": "<p>TerraMaster F2-210和F4-210存在任意文件读取漏洞攻击者可通过敏感信息泄露伪造session来读取任意文件获取敏感信息。</p>",
"Product": "TerraMaster F4-210",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://www.terra-master.com/cn/\">https://www.terra-master.com/cn/</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Terramaster F4-210 Arbitrary File Read",
"VulType": ["file-read"],
"Tags": ["file-read"],
"Description": "<p>TerraMaster F2-210 and F4-210 are NAS (Network Attached Storage) devices of Terramaster, Shenzhen, China.</p><p>TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.</p>",
"Impact": "<p>TerraMaster F2-210 and F4-210 have arbitrary file reading vulnerabilities. Attackers can read arbitrary files and obtain sensitive information through sensitive information leaks and fake sessions.</p>",
"Product": "TerraMaster F4-210",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://www.terra-master.com/cn/\">https://www.terra-master.com/cn/</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://packetstormsecurity.com/files/165399/terramaster-exec.py.txt"
],
"HasExp": true,
"ExpParams": [
{
"name": "filepath",
"type": "input",
"value": "/etc/passwd"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"file-read"
],
"VulType": [
"file-read"
],
"CVEIDs": [
""
],
"CVSSScore": "7.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
""
],
"CNVD": [
""
]
}