Full Disclosure mailing list archives

[Full Disclosure] CVE-2024-25228: Unpatched Command Injection in Vinchin Backup & Recovery Versions 7.2 and Earlier


From: Valentin Lobstein via Fulldisclosure <fulldisclosure () seclists org>
Date: Wed, 13 Mar 2024 08:02:42 +0000

CVE ID: CVE-2024-25228

Title: Authenticated Command Injection Vulnerability in ManoeuvreHandler.class.php of Vinchin Backup & Recovery 
Versions 7.2 and Earlier

Description:
A critical security vulnerability has been discovered in the `getVerifydiyResult` function within the 
`ManoeuvreHandler.class.php` file of Vinchin Backup & Recovery software, affecting versions 7.2 and earlier. This 
function, intended for validating IP addresses or web resources, is vulnerable to authenticated command injection due 
to insufficient input validation and sanitization.

Function Analysis:
- The function accepts an input array `$params`, focusing on the `type` and `value` keys.
- Based on the `type`, it attempts to validate the input using either `verifyPing` (for IP addresses) or `verifyWeb` 
(for web resources).
- The vulnerability specifically lies in the `verifyPing` method, where the `exec` function is used to execute a `ping` 
command with the user-supplied `value`, without proper validation or sanitization.

Exploitation Risk:
Authenticated attackers can exploit this vulnerability by injecting malicious commands into the `value` parameter. When 
processed by the vulnerable function, these commands can be executed on the server, leading to unauthorized access or 
control.

Current Status:
As of the latest available information, no patch has been released for this vulnerability in versions 7.2 and earlier 
of Vinchin Backup & Recovery. The vendor has not acknowledged the vulnerability.

Recommendation:
Users are advised to apply strict access controls to mitigate the risk posed by this vulnerability until an official 
patch is released. Monitoring for any updates from Vinchin regarding this issue is also recommended.

Discoverer: Valentin Lobstein
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread: