8.8
CVSSv3

CVE-2019-9949

Published: 23/05/2019 Updated: 29/05/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Western Digital My Cloud Cloud, Mirror Gen2, EX2 Ultra, EX2100, EX4100, DL2100, DL4100, PR2100 and PR4100 before firmware 2.31.183 are affected by a code execution (as root, starting from a low-privilege user session) vulnerability. The cgi-bin/webfile_mgr.cgi file allows arbitrary file write by abusing symlinks. Specifically, this occurs by uploading a tar archive that contains a symbolic link, then uploading another archive that writes a file to the link using the "cgi_untar" command. Other commands might also be susceptible. Code can be executed because the "name" parameter passed to the cgi_unzip command is not sanitized.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

westerndigital my_cloud_firmware

westerndigital my_cloud_mirror_gen2_firmware

westerndigital my_cloud_ex2_ultra_firmware

westerndigital my_cloud_ex2100_firmware

westerndigital my_cloud_ex4100_firmware

westerndigital my_cloud_dl2100_firmware

westerndigital my_cloud_dl4100_firmware

westerndigital my_cloud_pr2100_firmware

westerndigital my_cloud_pr4100_firmware

Github Repositories

WD My Cloud PoC exploit

WD My Cloud RCE PoC Exploit Tested on WD My Cloud EX2 Ultra versions 231149 and 231163 Should work on other MyCloud models for the write-up go here Authentication bypass to acquire user-session (CVE-2019-9950) login_mgrcgi matches credentials against /etc/shadow, therefore the "nobody" account can be used to gain a low-privilege user session by providing &qu