9.8 CVE-2016-1555

CISA Kev Catalog RCE Path Traversal Used by Malware Patch Exploit
  

(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands.
https://nvd.nist.gov/vuln/detail/CVE-2016-1555

Categories

CWE-77 : Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. an attack-oriented phrase for this weakness. Note: often used when "OS command injection" (CWE-78) was intended. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) If at all possible, use library calls rather than external processes to recreate the desired functionality. If possible, ensure that all external commands called from the program are statically created. Run time: Run time policy enforcement may be used in an allowlist fashion to prevent use of any non-sanctioned commands. Assign permissions that prevent the user from accessing/opening privileged files. injection of sed script syntax ("sed injection") API service using a large generative AI model allows direct prompt injection to leak hard-coded system prompts or execute other prompts. anti-spam product allows injection of SNMP commands into confiuration file image program allows injection of commands in "Magick Vector Graphics (MVG)" language. Python-based dependency management tool avoids OS command injection when generating Git commands but allows injection of optional arguments with input beginning with a dash (CWE-88), potentially allowing for code execution. Canonical example of OS command injection. CGI program does not neutralize "|" metacharacter when invoking a phonebook program. Chain: improper input validation (CWE-20) in username parameter, leading to OS command injection (CWE-78), as exploited in the wild per CISA KEV. injection of sed script syntax ("sed injection") injection of sed script syntax ("sed injection")

References


 

CPE

cpe start end
Configuration 1
AND
   cpe:2.3:o:netgear:wnap320_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wnap320:-:*:*:*:*:*:*:*
Configuration 2
AND
   cpe:2.3:o:netgear:wndap350_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wndap350:-:*:*:*:*:*:*:*
Configuration 3
AND
   cpe:2.3:o:netgear:wndap360_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wndap360:-:*:*:*:*:*:*:*
Configuration 4
AND
   cpe:2.3:o:netgear:wndap210v2_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wndap210v2:-:*:*:*:*:*:*:*
Configuration 5
AND
   cpe:2.3:o:netgear:wn604_firmware:*:*:*:*:*:*:*:* <= 3.3.2
  Running on/with
  cpe:2.3:h:netgear:wn604:-:*:*:*:*:*:*:*
Configuration 6
AND
   cpe:2.3:o:netgear:wndap660_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wndap660:-:*:*:*:*:*:*:*
Configuration 7
AND
   cpe:2.3:o:netgear:wn802tv2_firmware:*:*:*:*:*:*:*:* <= 3.0.5.0
  Running on/with
  cpe:2.3:h:netgear:wn802tv2:-:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://kb.netgear.com/30480/CVE-2016-1555-Notification?cid=wmt_netgear_organic


EXPLOITS


Exploit-db.com

id description date
45909 Netgear Devices - (Unauthenticated) Remote Command Execution (Metasploit) 2018-11-27

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://www.exploit-db.com/exploits/45909/


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
136 LDAP Injection
High
15 Command Delimiters
High
183 IMAP/SMTP Command Injection
Medium
248 Command Injection
High
40 Manipulating Writeable Terminal Devices
Very High
43 Exploiting Multiple Input Interpretation Layers
High
75 Manipulating Writeable Configuration Files
Very High
76 Manipulating Web Input to File System Calls
Very High