Rapid7 Vulnerability & Exploit Database

Syncovery For Linux Web-GUI Session Token Brute-Forcer

Back to Search

Syncovery For Linux Web-GUI Session Token Brute-Forcer

Disclosed
09/06/2022
Created
12/14/2022

Description

This module attempts to brute-force a valid session token for the Syncovery File Sync & Backup Software Web-GUI by generating all possible tokens, for every second between 'DateTime.now' and the given X day(s). By default today and yesterday (DAYS = 1) will be checked. If a valid session token is found, the module stops. The vulnerability exists, because in Syncovery session tokens are basically just base64(m/d/Y H:M:S) at the time of the login instead of a random token. If a user does not log out (Syncovery v8.x has no logout) session tokens will remain valid until reboot.

Author(s)

  • Jan Rude

Platform

Linux

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/scanner/http/syncovery_linux_token_cve_2022_36536
msf auxiliary(syncovery_linux_token_cve_2022_36536) > show actions
    ...actions...
msf auxiliary(syncovery_linux_token_cve_2022_36536) > set ACTION < action-name >
msf auxiliary(syncovery_linux_token_cve_2022_36536) > show options
    ...show and set options...
msf auxiliary(syncovery_linux_token_cve_2022_36536) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;