Vulnerability: Path traversal (also known as directory traversal or file path injection)
Path traversal in Enterprise loadbalancer VA MAX Appliance v8.3.8-134
Vendor: Loadbalancer.org, https://www.loadbalancer.org
Product: ENTERPRISE VA MAX
Version affected: Loadbalancer.org Appliance v8.3.8 as the latest in October 2019
Product description:
“Loadbalancer.org is a well-established international provider of reliable, versatile and cost-effective application delivery products and services. The load balancer experts help solve the issues of availability and scalability by providing an unbreakable solution to ensure zero downtime of critical IT applications.
Loadbalancer.org’s consultancy led approach means they have specialist engineers that will help design and simplify architecture guaranteeing painless deployments every single time. The team of experts are effortlessly able to set up test environments, document each deployment, provide customized solutions and assist with complex migrations. They will support a business, not just the load balancer!
Loadbalancer.org load balancers are sold as hardware, virtual or cloud formats and are more scalable, flexible and are economical compared to competitive offerings. With no performance or feature restrictions, their suite of products can load balance any application, for any company, in any industry, anywhere in the world.
Allowing customers to have direct access 24 hours a day 7 days a week to a team of passionate engineers via phone, online chat and e-mail sets Loadbalancer.org apart from other ADC vendors.
” as per statement on https://www.linkedin.com/company/loadbalancer-org website.
- CVE ID: CVE-2020-13377
- CWE ID: CWE-35
Vulnerability description:
Path traversal (also known as directory traversal or file path injection) is a type of vulnerability that allows an attacker to access files and directories on a web server that are outside of the web root directory. This vulnerability occurs when a web application does not properly sanitize user input that is used to construct a file path.
The evidence of a path traversal attack could include a log entry that shows an attempt to access a file or directory that is outside the expected range of directories. For example, if the web application is designed to serve files from the directory /var/www/html/, an attacker might try to access the file /etc/passwd by providing input such as ../../../../../etc/passwd.
Other evidence of a path traversal attack could include unusual file access patterns or unexpected file system activity, which could be detected through file system monitoring tools or intrusion detection systems. Additionally, if an attacker is able to successfully exploit a path traversal vulnerability, they may be able to exfiltrate sensitive data or execute arbitrary code on the web server. In such cases, the evidence of the attack may include changes to system files or the creation of new files or directories.
Proof of Concept
A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted HTTP request. This is exploitable by an authenticated attacker who submits a modified GET request.
Sample GET request to ‘etc/shadow’ file, which allowed an attacker to access files and directories on a web server that are outside of the web root directory. This vulnerability occurs when a web application does not properly sanitize user input that is used to construct a file path.
Identified vulnerable parameters: waf_filename
Request:
Public searches:
https://www.zoomeye.org/searchResult?q=Loadbalancer%2Corg
https://www.shodan.io/search?query=loadbalancer.org
but this company has interestingly some reputable partnership alliance
References
- https://www.immuniweb.com/vulnerability/os-command-injection.html
- https://www.loadbalancer.org
- https://cwe.mitre.org/data/definitions/78.html
- https://www.checkmarx.com/knowledge/knowledgebase/OS-Command_Injection