{"id":5199,"date":"2018-04-20T01:46:57","date_gmt":"2018-04-20T04:46:57","guid":{"rendered":"https:\/\/www.kwell.net\/kwell_blog\/?p=5199"},"modified":"2018-05-07T21:12:11","modified_gmt":"2018-05-08T00:12:11","slug":"cve-2018-10201-ncomputing-vspace-pro-directory-traversal-vulnerability","status":"publish","type":"post","link":"https:\/\/www.kwell.net\/kwell_blog\/?p=5199","title":{"rendered":"CVE-2018-10201 &#8211; Ncomputing vSpace Pro Directory Traversal Vulnerability"},"content":{"rendered":"<p class=\"Textopreformateado\" style=\"line-height: 10px;\"><b><u><span style=\"font-size: 12.0pt;\">CVE-2018-10201<\/span><\/u><\/b><\/p>\n<p><strong>Ncomputing vSpace Pro Directory Traversal Vulnerability<\/strong><\/p>\n<p>[Description]<\/p>\n<p>An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11.<\/p>\n<p>It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with &#8230;\/ or &#8230;\\ or &#8230;.\/ or &#8230;.\\ as a directory-traversal pattern to TCP port 8667.<\/p>\n<p>An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system. This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.<\/p>\n<p><!--more--><\/p>\n<hr \/>\n<p>[Additional Information]<\/p>\n<p>nmap -p T:8667 -Pn your_vSpace_server<\/p>\n<p>Nmap scan report for your_vSpace_server (x.x.x.x)<br \/>\nHost is up (0.044s latency).<\/p>\n<p>PORT\u00a0\u00a0\u00a0\u00a0 STATE SERVICE<br \/>\n8667\/tcp open\u00a0 unknown<\/p>\n<p class=\"Textopreformateado\">http:\/\/your_vSpace_server:8667\/...\/...\/...\/...\/...\/...\/...\/...\/...\/windows\/win.ini<\/p>\n<p class=\"Textopreformateado\">http:\/\/your_vSpace_server:8667\/...\\...\\...\\...\\...\\...\\...\\...\\...\\windows\\win.ini<\/p>\n<p class=\"Textopreformateado\">http:\/\/your_vSpace_server:8667\/....\/....\/....\/....\/....\/....\/....\/....\/....\/windows\/win.ini<\/p>\n<p class=\"Textopreformateado\">http:\/\/your_vSpace_server:8667\/....\\....\\....\\....\\....\\....\\....\\....\\....\\windows\\win.ini<\/p>\n<hr \/>\n<p>[Vulnerability Type]<br \/>\nDirectory Traversal<\/p>\n<hr \/>\n<p>[Vendor of Product]<br \/>\nNComputing<\/p>\n<hr \/>\n<p>[Affected Product Code Base]<br \/>\nvSpace &#8211; Pro 10<br \/>\nvSpace &#8211; Pro 11<\/p>\n<hr \/>\n<p>[Affected Component]<br \/>\nNcMonitorServer.exe TCP 8667<br \/>\nNC Monitor Server: Health monitoring agents connect to it to provide collected data<\/p>\n<hr \/>\n<p>[Attack Type]<br \/>\nRemote<\/p>\n<hr \/>\n<p>[Impact Information Disclosure]<br \/>\nTrue<\/p>\n<hr \/>\n<p>[Discoverer]<br \/>\nJavier Bernardo &#8211; <a href=\"http:\/\/www.kwell.net\">Kwell.net<\/a><br \/>\nemail: <a href=\"mailto:javier@kwell.net\">javier@kwell.net<\/a><\/p>\n<hr \/>\n<p><span style=\"font-family: 'Arial','sans-serif';\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10201\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-10201<\/a><\/span><\/p>\n<p><span style=\"font-family: 'Arial','sans-serif';\"><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-10201\">http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-10201<\/a><\/span><\/p>\n<p>[Attack vectors]<\/p>\n<p>Unprivileged access to files across all file system could lead to exposure of sensitive data like: password hashes, application hard codes, history files, log files, databases, etc. A malicious user could use this vulnerability to fingerprint operative system, software, hardware, drivers, devices, networks, etc. and also access source code of applications which they can scour for more\u00a0 vulnerabilities. In some situations, an attacker can leverage the file path traversal vulnerability to gain complete control over the server.<\/p>\n<p>In this example you will see a Proof of Concept Video of the founded vulnerability.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/lP9po6LRUfA\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>First, I check if the service is running on the server doing NMAP to 8667\/tcp port. At first sight vSpace does not specifies ways to change Health Service Agent port. We are investigating server responses in order to detect this service in any other port.<\/p>\n<p>Next, I used the fuzzer <a href=\"http:\/\/dotdotpwn.sectester.net\/\">DotDotPwn<\/a> just to \u201cdouble-check\u201d the expression that I found which triggers the path traversal vulnerability. The command has a tweak to create the correct pattern with three or four dots. My fuzzer tests this kind of combinations. I have contacted DotDotPwn to see if they test this pattern. If not, it will be a good idea to do it.<\/p>\n<p>Ncomputing platform requires Remote Desktop Protocol, by cracking password hashes attackers could gain remote access to the server.<\/p>\n<p>Also I guess this vulnerability could easily lead to an excessive usage of hardware resources (CPU, RAM, HD, and Network) if you for example try to read multiple large files. I did not test it yet, but Denial of Service could be around the corner.<\/p>\n<p>I have successfully verified the vulnerability in vSpace Pro 10 and the recently released version 11.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/OerzlX4iL5Y\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>There are many cases in which directory traversal attacks could also lead to overwriting arbitrary files and directory listing exposures. This can lead to information leakage and can be used to pivot to other more serious attacks like remote code execution.<\/p>\n<p>If we base estimations taking Ncomputing\u00b4s own numbers, I quote \u201c&#8230;With over 70,000 customers and 20 million daily users in 140 countries&#8230;\u201d including government plus that the vendor announces Linux and Citrix compatibility,\u00a0 this vulnerability puts a great number of servers around the world at high risk.<\/p>\n<p>[Suggested Workaround]<\/p>\n<p>Disable Health Monitor Agent Service.<\/p>\n<p>[Suggested Solution]<\/p>\n<p>Patch from vendor for both versions (vSpace Pro 10 and vSpace Pro 11)<\/p>\n<hr \/>\n<h3>Disclaimer<\/h3>\n<h3>You use the advice on this site at your own risk<\/h3>\n<p>This web site and its creator is not responsible for, and expressly disclaims all liability for, damages of any kind arising out of use, reference to, or reliance on any information contained within the site. While the information contained within the site is periodically updated, no guarantee is given that the information provided in this web site is correct, complete, and up-to-date.<\/p>\n<p>Although this site may include links providing direct access to other Internet resources, including web sites, I am not responsible for the accuracy or content of information contained in these sites.<\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-5199\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-5199\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20CVE-2018-10201%20-%20Ncomputing%20vSpace%20Pro%20Directory%20Traversal%20Vulnerability&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D5199&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"42c203ab22\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-5199\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-5199\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>CVE-2018-10201 Ncomputing vSpace Pro Directory Traversal Vulnerability [Description] An issue was discovered in NcMonitorServer.exe in NC Monitor Server in NComputing vSpace Pro 10 and 11. It is possible to read arbitrary files outside the root directory of the web server. This vulnerability could be exploited remotely by a crafted URL without credentials, with &#8230;\/ or &hellip;<br \/><a href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199\">Read more <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n<div class=\"sharedaddy sd-sharing-enabled\"><div class=\"robots-nocontent sd-block sd-social sd-social-icon-text sd-sharing\"><h3 class=\"sd-title\">Comparte esto:<\/h3><div class=\"sd-content\"><ul><li class=\"share-facebook\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-facebook-5199\" class=\"share-facebook sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=facebook\" target=\"_blank\" title=\"Haz clic para compartir en Facebook\" ><span>Facebook<\/span><\/a><\/li><li class=\"share-twitter\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-twitter-5199\" class=\"share-twitter sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=twitter\" target=\"_blank\" title=\"Haz clic para compartir en Twitter\" ><span>Twitter<\/span><\/a><\/li><li class=\"share-email\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-email sd-button share-icon\" href=\"mailto:?subject=%5BEntrada%20compartida%5D%20CVE-2018-10201%20-%20Ncomputing%20vSpace%20Pro%20Directory%20Traversal%20Vulnerability&body=https%3A%2F%2Fwww.kwell.net%2Fkwell_blog%2F%3Fp%3D5199&share=email\" target=\"_blank\" title=\"Haz clic para enviar un enlace por correo electr\u00f3nico a un amigo\" data-email-share-error-title=\"\u00bfTienes un correo electr\u00f3nico configurado?\" data-email-share-error-text=\"Si tienes problemas al compartir por correo electr\u00f3nico, es posible que sea porque no tengas un correo electr\u00f3nico configurado en tu navegador. Puede que tengas que crear un nuevo correo electr\u00f3nico t\u00fa mismo.\" data-email-share-nonce=\"42c203ab22\" data-email-share-track-url=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=email\"><span>Correo electr\u00f3nico<\/span><\/a><\/li><li class=\"share-jetpack-whatsapp\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-jetpack-whatsapp sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=jetpack-whatsapp\" target=\"_blank\" title=\"Haz clic para compartir en WhatsApp\" ><span>WhatsApp<\/span><\/a><\/li><li class=\"share-skype\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-skype-5199\" class=\"share-skype sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=skype\" target=\"_blank\" title=\"Haz clic para compartir en Skype\" ><span>Skype<\/span><\/a><\/li><li class=\"share-print\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"\" class=\"share-print sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199\" target=\"_blank\" title=\"Haz clic para imprimir\" ><span>Imprimir<\/span><\/a><\/li><li class=\"share-linkedin\"><a rel=\"nofollow noopener noreferrer\" data-shared=\"sharing-linkedin-5199\" class=\"share-linkedin sd-button share-icon\" href=\"https:\/\/www.kwell.net\/kwell_blog\/?p=5199&amp;share=linkedin\" target=\"_blank\" title=\"Haz clic para compartir en LinkedIn\" ><span>LinkedIn<\/span><\/a><\/li><li class=\"share-end\"><\/li><\/ul><\/div><\/div><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[3,87,80],"tags":[181],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/5199"}],"collection":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5199"}],"version-history":[{"count":12,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/5199\/revisions"}],"predecessor-version":[{"id":5233,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=\/wp\/v2\/posts\/5199\/revisions\/5233"}],"wp:attachment":[{"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kwell.net\/kwell_blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}