This advisory details an OS command injection vulnerability in Cyberoam UTM appliances, where the 'host' parameter in diagnostic tools lacks server-side validation, allowing authenticated users to execute arbitrary commands as root. It also describes insecure password handling where domain credentials are exposed to authenticated clients.
Classification
Writeup 95%
Target:
Cyberoam CR50ia 10.01.0 build 678
Auth required
Prerequisites:
Authenticated access to the Cyberoam UTM web interface · Valid JSESSIONID cookie