MikroTik RouterOS through 6.44.5 and 6.45.x through 6.45.3 improperly handles the disk name, which allows authenticated users to delete arbitrary files. Attackers can exploit this vulnerability to reset credential storage, which allows them access to the management interface as an administrator without authentication.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://mikrotik.com/download/changelogs/testing-release-tree | release notes vendor advisory |
https://fortiguard.com/zeroday/FG-VD-19-108 | third party advisory |
https://medium.com/tenable-techblog/rooting-routeros-with-a-usb-drive-16d7b8665f90 | third party advisory press/media coverage |
https://github.com/tenable/routeros/tree/master/poc/cve_2019_15055 | third party advisory exploit |
https://forum.mikrotik.com/viewtopic.php?t=151603 |