36 lines
1.3 KiB
JSON
Raw Normal View History

{
"id": "CVE-2022-24989",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-20T18:15:09.523",
"lastModified": "2023-08-21T12:47:18.157",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "TerraMaster NAS through 4.2.30 allows remote WAN attackers to execute arbitrary code as root via the raidtype and diskstring parameters for PHP Object Instantiation to the api.php?mobile/createRaid URI. (Shell metacharacters can be placed in raidtype because popen is used without any sanitization.) The credentials from CVE-2022-24990 exploitation can be used."
}
],
"metrics": {},
"references": [
{
"url": "https://attackerkb.com/topics/h8YKVKx21t/cve-2022-24990",
"source": "cve@mitre.org"
},
{
"url": "https://forum.terra-master.com/en/viewforum.php?f=28",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0xf4n9x/CVE-2022-24990",
"source": "cve@mitre.org"
},
{
"url": "https://octagon.net/blog/2022/03/07/cve-2022-24990-terrmaster-tos-unauthenticated-remote-command-execution-via-php-object-instantiation",
"source": "cve@mitre.org"
},
{
"url": "https://packetstormsecurity.com/files/172904",
"source": "cve@mitre.org"
}
]
}