Vulnerabilities > CVE-2018-0706 - Unspecified vulnerability in Qnap Q'Center

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
qnap
exploit available
metasploit

Summary

Exposure of Private Information in QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to access sensitive information.

Exploit-Db

  • descriptionQNAP Q'Center - change_passwd Command Execution (Metasploit). CVE-2018-0706,CVE-2018-0707. Remote exploit for Linux platform. Tags: Metasploit Framework (MSF...
    fileexploits/linux/remote/45043.rb
    idEDB-ID:45043
    last seen2018-07-17
    modified2018-07-17
    platformlinux
    port443
    published2018-07-17
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/45043/
    titleQNAP Q'Center - change_passwd Command Execution (Metasploit)
    typeremote
  • descriptionQNAP Qcenter Virtual Appliance - Multiple Vulnerabilities. CVE-2018-0706,CVE-2018-0707,CVE-2018-0708,CVE-2018-0709,CVE-2018-0710. Webapps exploit for Hardwar...
    fileexploits/hardware/webapps/45015.txt
    idEDB-ID:45015
    last seen2018-07-13
    modified2018-07-13
    platformhardware
    port443
    published2018-07-13
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/45015/
    titleQNAP Qcenter Virtual Appliance - Multiple Vulnerabilities
    typewebapps

Metasploit

descriptionThis module exploits a command injection vulnerability in the `change_passwd` API method within the web interface of QNAP Q'Center virtual appliance versions prior to 1.7.1083. The vulnerability allows the 'admin' privileged user account to execute arbitrary commands as the 'admin' operating system user. Valid credentials for the 'admin' user account are required, however, this module also exploits a separate password disclosure issue which allows any authenticated user to view the password set for the 'admin' user during first install. This module has been tested successfully on QNAP Q'Center appliance version 1.6.1075.
idMSF:EXPLOIT/LINUX/HTTP/QNAP_QCENTER_CHANGE_PASSWD_EXEC
last seen2020-06-14
modified2019-01-10
published2018-07-12
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/qnap_qcenter_change_passwd_exec.rb
titleQNAP Q'Center change_passwd Command Execution

Packetstorm