Enjay CRM 1.0 - Multiple code executions via Unrestricted Terminal
However some of these options opens a terminal to perform a specific activity, This terminal is unrestricted and user can access the underlying OS as a ROOT and can run any command on OS.
Underlying OS can be accessed using two methods; Also CVEs are assigned to these findings.
1. Using Ping menu (CVE-2024-41308): it will open a terminal and user can click on File menu -> New Tab/New window. And root level terminal will be open.
2. Using Hardware info (CVE-2024-41309): Once the Hardware info page opens click on Help menu and either select "Open HardInfo Website" or "Report bug", it will open an unrestricted terminal where user can click on File menu -> New Tab/New window. And root level terminal will be open.
Both the vulnerabilities are closed in latest version of CRM OS 1.1 and latest.
Enjay CRM interface:
1. Terminal Access with Ping menu:
The software's feature to ping a host inadvertently allows users to escape the restricted terminal environment, granting unauthorized access to the underlying operating system or full terminal access.
Click on Ping Button input any IP and number of pings.
Once user click on Ping button it will open a terminal which can be escaped and New terminal can be open as a root permission as shown below.
And it will open another terminal as shown below.
Technical Details:
2. Terminal Access with Hardware info menu:
The Software allow readonly access to check the OS/Hardware and other information using Hardinfo software, However there an option of "reporting bug" or "opening Hardinfo website". Since there is no browser installed in the OS these option by default opens the terminal using it we can access the restricted terminal.
Comments
Post a Comment