The article provides technical details and describes the steps needed for exploiting a software vulnerability in daloRADIUS (https://github.com/lirantal/daloradius). In particular, an unauthenticated user can gather information on the remote system just by visiting the following endpoints: /library/exten-radius_server_info.php (which reveals pieces of information such as system uptime, CPU load, etc.) and /library/exten-server_info.php (which reveals if mysql and/or freeradius are currently running). The CVE-2022-4366 identifier has been assigned to the vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2022-4366) which has a high severity score (7.5/10, assigned by NIST).
Sensitive system information disclosure in daloRADIUS
F M Lauria
2022
Abstract
The article provides technical details and describes the steps needed for exploiting a software vulnerability in daloRADIUS (https://github.com/lirantal/daloradius). In particular, an unauthenticated user can gather information on the remote system just by visiting the following endpoints: /library/exten-radius_server_info.php (which reveals pieces of information such as system uptime, CPU load, etc.) and /library/exten-server_info.php (which reveals if mysql and/or freeradius are currently running). The CVE-2022-4366 identifier has been assigned to the vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2022-4366) which has a high severity score (7.5/10, assigned by NIST).I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.