The QNAP Signage Station prior to version 2.0.1 and the accompanying iArtist Lite application contain multiple vulnerabilities.
CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2015-6022
An authenticated attacker without administrative permissions may upload a malicious file, such as a PHP script, to the QNAP Signage Station server. The attacker is then able to access the uploaded file via a predictable URL and execute the script. The script is executed on the server with administrator permissions.
CWE-290: Authentication Bypass by Spoofing - CVE-2015-6036
An unauthenticated attacker may spoof an HTTP request to the QNAP Signage Station in such a manner as to bypass authentication, allowing the attacker to perform actions such as upload files.
QNAP iArtist Lite contains a hard-coded FTP account and password, and uses these credentials to communicate with Signage Station. FTP transmits all data in plain text and is not secure from attackers eavesdropping on the network.
CWE-427: Uncontrolled Search Path Element - CVE-2015-7262
QNAP iArtist Lite allows a user to register a binary with the iArtist service, which will be executed with SYSTEM privileges upon next system restart.
An unauthenticated user may be able to execute commands on the server with system privileges.
Apply an update
QNAP has released Signage Station 2.0.1 and iArtist Lite 1.4.54 to address this issue. Affected users are encouraged to update as soon as possible.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Notified: September 23, 2015 Updated: October 16, 2015
Statement Date: September 25, 2015
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 9.0 | AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal | 7.4 | E:F/RL:OF/RC:C
Environmental | 5.6 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND
Thanks to Mark Woods for reporting these vulnerabilities.
This document was written by Garret Wassermann.
CVE IDs: | CVE-2015-6022, CVE-2015-6036, CVE-2015-7261, CVE-2015-7262
Date Public: | 2016-02-25
Date First Published: | 2016-02-25
Date Last Updated: | 2016-02-25 18:16 UTC
Document Revision: | 60