NetGear RAIDiator (ReadyNAS) Cross Site Request Forgery and Command Injection Vulnerabilities

Summary
NetGear RAIDiator is prone to a cross-site request-forgery vulnerability and a command-injection vulnerability.
Impact
Exploiting these issues may allow a remote attacker to perform certain administrative actions and execute arbitrary shell commands with root privileges. Other attacks are also possible.
Solution
Updates are available. Please see the references or vendor advisory for more information.
Insight
The NETGEAR ReadyNAS RAIDiator firmware prior to the 4.2.24 release is prone to remote command execution through the FrontView web interface. An attacker can use an unauthenticated HTTP GET request to execute arbitrary commands as user 'admin' on the remote NAS device. This vulnerability exists due to a failure in /frontview/lib/np_handler.pl to sanitize user-input. Due to various improper file system permissions, the admin user can execute commands as root.
Affected
Following are vulnerable: RAIDiator versions prior to 4.1.12 running on SPARC RAIDiator-x86 versions prior to 4.2.24
Detection
Send a crafted HTTP GET request which tries to execute the 'id' command.
References