QNAP TS-431 QTS Remote Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 8 Mar 2019.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module creates a virtual web server and uploads the php payload into it. Admin privileges cannot access any server files except File Station files. The user who is authorized to create Virtual Web Server can upload malicious php file by activating the server. Exploit creates a new directory into File Station to connect to the web server. However, only the "index.php" file is allowed to work in the virtual web server directory. No files can be executed except "index.php". Gives an access error. After the harmful "index.php" has been uploaded, the shell can be retrieved from the server. There is also the possibility of working in higher versions. Affects versions prior to 4.2.2.

    Continue reading...
     

Share This Page

Loading...