You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Kasma Technologies Inc’s KasmaVNC component is affected by a vulnerability that may allow an attacker to browse the underlaying filesystem files (more commonly known as Directory Traversal).
AFFECTED PRODUCTS
KasmaVNC. Confirmed in version 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489. Other previous versions might also be affected.
TECHNICAL DETAILS
The attack involves manipulating variables / paths that reference files with “dot-dot-slash (…/)” sequences and its variations or by using absolute file paths. This could potentially allow an attacker to access arbitrary files and directories stored on the file system, including application source code, configuration, and critical system files. Follow these guided steps to replicate the vulnerability:
Start ‘kasmvncserver’:
Submit the following GET request to access the /etc/passwd of the filesystem:
GET /%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd HTTP/1.1
Host: 192.168.153.131:8444
Authorization: Basic Y3JlZHM6cmVxdWlyZWQ=
Connection: keep-alive
The problem seems to be in common/network/websocket.c
in which the if statement doesn’t take into consideration URL encoding (%2e%2e is equal to ..), making it possible to browse parent directories and read local files.
A CVE ID has been requested to MITRE and will update this thread once it has been assigned.
IMPACT
This behavior allows remote authenticated attackers able to reach the KasmaVNC server, to browse and read files on the remote filesystem. This also include the kasmpasswd file which includes all other user’s hashed passwords.
The text was updated successfully, but these errors were encountered:
Internal ticket KASM-6090 has been opened. It should be noted that, if confirmed, the bug requires authentication and since KasmVNC is running as the user that is authenticated, they would only be able to access files that they already have access to anyway. So it certainly would be a vulnerability, but the CVSS scoring should be adjusted to reflect those limitations.
SUMMARY
Kasma Technologies Inc’s KasmaVNC component is affected by a vulnerability that may allow an attacker to browse the underlaying filesystem files (more commonly known as Directory Traversal).
AFFECTED PRODUCTS
KasmaVNC. Confirmed in version 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489. Other previous versions might also be affected.
TECHNICAL DETAILS
The attack involves manipulating variables / paths that reference files with “dot-dot-slash (…/)” sequences and its variations or by using absolute file paths. This could potentially allow an attacker to access arbitrary files and directories stored on the file system, including application source code, configuration, and critical system files. Follow these guided steps to replicate the vulnerability:
The problem seems to be in common/network/websocket.c
KasmVNC/common/network/websocket.c
Line 902 in 9f7a6b5
A CVE ID has been requested to MITRE and will update this thread once it has been assigned.
IMPACT
This behavior allows remote authenticated attackers able to reach the KasmaVNC server, to browse and read files on the remote filesystem. This also include the kasmpasswd file which includes all other user’s hashed passwords.
The text was updated successfully, but these errors were encountered: