SRC-2016-0033 : Samsung Security Manager Redis Server Injection Remote Code Execution Vulnerability
CVE ID:
N/A
CVSS Score:
6.9, (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Affected Vendors:
Samsung
Affected Products:
Samsung Security Manager
Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Security Manager. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Redis service that is installed as part of this product. By issuing an HTTP POST request, an attacker can create an arbitrary file on the server with attacker controlled data. An attacker can further leverage this vulnerability to execute code on the server as SYSTEM.
Vendor Response:
Samsung has not issued an update to correct this vulnerability.
Disclosure Timeline:
- 2016-07-25 – Vulnerability reported to vendor & ICS-CERT
- 2016-07-27 – The vendor responded with status that they cannot reproduce any of the issues
- 2016-07-28 - Resent the initial reports and explained in depth the vulnerabilities
- 2016-07-31 - The vendor responded again with "Nothing is happened" after running multiple PoC exploits
- 2016-08-08 - Requested the help of ICS-CERT in dealing with the vendor
- 2016-08-08 - The vendor stated they have forwarded the information on to one of their developers
- 2016-08-18 - No response from the vendor or ICS-CERT
- 2016-08-21 - Reminder email sent to the vendor that Source Incite intends to release as zero-day
- 2016-08-22 - The release of this zero-day advisory
Proof of Concept:
https://github.com/sourceincite/poc/blob/master/SRC-2016-0033.html
Credit:
This vulnerability was discovered by Steven Seeley of Source Incite
Acknowledgments:
Source Incite would like to acknowledge ICS-CERT for the help with co-ordination of this vulnerability.