Seagate NAS OS 4.3.15.1 - Open Redirect
ID: CVE-2018-12300
Severity: medium
Author: 0x_Akoko
Tags: cve2018,cve,redirect,seagate,nasos
Description
Section titled “Description”Seagate NAS OS 4.3.15.1 contains an open redirect vulnerability in echo-server.html, which can allow an attacker to disclose information in the referer header via the state URL parameter.
YAML Source
Section titled “YAML Source”id: CVE-2018-12300
info: name: Seagate NAS OS 4.3.15.1 - Open Redirect author: 0x_Akoko severity: medium description: Seagate NAS OS 4.3.15.1 contains an open redirect vulnerability in echo-server.html, which can allow an attacker to disclose information in the referer header via the state URL parameter. impact: | Successful exploitation of this vulnerability could lead to user redirection to malicious websites, potentially resulting in the theft of sensitive information or the installation of malware. remediation: | Apply the latest security patches or updates provided by Seagate to fix the open redirect vulnerability in NAS OS 4.3.15.1. reference: - https://blog.securityevaluators.com/invading-your-personal-cloud-ise-labs-exploits-the-seagate-stcr3000101-ecf89de2170 - https://nvd.nist.gov/vuln/detail/CVE-2018-12300 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-12300 cwe-id: CWE-601 epss-score: 0.00118 epss-percentile: 0.45685 cpe: cpe:2.3:o:seagate:nas_os:4.3.15.1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: seagate product: nas_os shodan-query: http.title:"seagate nas - seagate" fofa-query: title="seagate nas - seagate" google-query: intitle:"seagate nas - seagate" tags: cve2018,cve,redirect,seagate,nasos
http: - method: GET path: - '{{BaseURL}}/echo-server.html?code=test&state=http://www.interact.sh#'
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1# digest: 4a0a00473045022100ec5d1c4681461e3e933210a986688f062debd354951e41391e95c852e58c1e52022077c6a3b6b81b12f345449af4fbfbb2b4cd1714cfd458203a777deaa9003ba533:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-12300.yaml"