SSD Advisory – Remote Command Execution in Western Digital with Dropbox App

Vulnerability summary
The following advisory describes an unauthenticated Remote Command Execution vulnerability in My Cloud products with that has Dropbox App installed.
The My Passport, My Book, and My Cloud (Single-Bay) drives allow users to backup their data to an existing Dropbox account using WD SmartWare Pro, WD Backup. The My Cloud Dropbox App (Available on the multi-bay My Cloud drives) allows a user to sign-in to their Dropbox account and synchronize the data stored between the drive and Dropbox storage.
An independent security researcher, Kacper Szurek, has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program
Vendor response
Western Digital was informed of the vulnerability, and released Dropbox v2.00 to address it.

Vulnerability details
User controlled input is not sufficiently sanitized, and then passed to a system() function. The attacker controlled input $_REQUEST[‘account’] found in dropbox.php can be exploited to gain remote command execution.

$date = new DateTime();
$r    = $date->getTimestamp();
$cmd        = $_REQUEST['cmd'];
$DropboxAPI = new DropboxAPI;
switch ($cmd) {
    case "delBlacklist":
    case "getBlacklist":
    case "setBlacklist":
    case "getTree":
class DropboxAPI
    public function getBlacklist()
        $account = $_REQUEST['account'];
        $xmlPath = "/tmp/dBlack_$account.xml";
        $cmd = "dropnasctl -j $account --black_list_get -x $xmlPath >/dev/null";
        if (file_exists($xmlPath)) {
            print file_get_contents($xmlPath);
        } else {
            print "<config><list></list></config>";

Proof of Concept
The following PoC will run the ‘ls‘ command on victim’s machine



Get in touch