CVE-2023-27358

NETGEAR RAX30 SOAP Request SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of NETGEAR RAX30 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of specific SOAP requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the service account. Was ZDI-CAN-19754.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netgear:raxe300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe300:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax38:-:*:*:*:*:*:*:*

History

09 Jan 2025, 15:37

Type Values Removed Values Added
First Time Netgear rax35 Firmware
Netgear rax38
Netgear rax40
Netgear raxe300
Netgear raxe300 Firmware
Netgear
Netgear rax30 Firmware
Netgear rax30
Netgear rax35
Netgear rax38 Firmware
Netgear rax40 Firmware
CPE cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax38:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax38_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax35:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:raxe300:-:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:rax35_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:netgear:raxe300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*
References () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - Vendor Advisory
References () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - Third Party Advisory

21 Nov 2024, 07:52

Type Values Removed Values Added
References () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 - () https://kb.netgear.com/000065617/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-PSV-2022-0349 -
References () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-502/ -
Summary
  • (es) Vulnerabilidad de ejecución remota de código de inyección SQL de solicitud SOAP de NETGEAR RAX30. Esta vulnerabilidad permite a atacantes adyacentes a la red ejecutar código arbitrario en instalaciones afectadas de enrutadores NETGEAR RAX30. No se requiere autenticación para aprovechar esta vulnerabilidad. La falla específica existe en el manejo de solicitudes SOAP específicas. El problema se debe a la falta de validación adecuada de una cadena proporcionada por el usuario antes de usarla para construir consultas SQL. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar código arbitrario en el contexto de la cuenta de servicio. Era ZDI-CAN-19754.

03 May 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 02:15

Updated : 2025-01-09 15:37


NVD link : CVE-2023-27358

Mitre link : CVE-2023-27358

CVE.ORG link : CVE-2023-27358


JSON object : View

Products Affected

netgear

  • rax30
  • rax35_firmware
  • raxe300
  • rax40_firmware
  • rax38_firmware
  • rax30_firmware
  • rax35
  • rax40
  • rax38
  • raxe300_firmware
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')