CVE-2021-42370

7.5 HIGH

📋 TL;DR

This vulnerability in XoruX LPAR2RRD and STOR2RRD exposes cleartext passwords in HTML password input fields when viewing device properties. Attackers with access to the web interface can view stored passwords by configuring their browser to display password fields. Organizations using affected versions of these monitoring tools are at risk.

💻 Affected Systems

Products:
  • XoruX LPAR2RRD
  • XoruX STOR2RRD
Versions: All versions before 7.30
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the web interface when viewing device properties; requires access to the application's web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, leading to complete compromise of monitored systems, data exfiltration, or lateral movement across infrastructure.

🟠

Likely Case

Unauthorized users with web interface access extract passwords for monitored devices, potentially gaining access to storage arrays, servers, or network equipment.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to credential exposure without direct access to critical systems.

🌐 Internet-Facing: HIGH if web interface is exposed to internet, as attackers can remotely harvest credentials.
🏢 Internal Only: MEDIUM as internal attackers or compromised accounts can still extract credentials from the web interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires web interface access but is trivial once authenticated; involves browser configuration to reveal password fields.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.30 and later

Vendor Advisory: https://lpar2rrd.com/note730.php

Restart Required: Yes

Instructions:

1. Download version 7.30 or later from vendor website. 2. Backup current configuration. 3. Stop the application service. 4. Install the update. 5. Restart the application service. 6. Verify functionality.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the LPAR2RRD/STOR2RRD web interface to only trusted users and networks using firewall rules or network segmentation.

Implement Strong Authentication

all

Enforce multi-factor authentication for web interface access and use strong, unique passwords for application accounts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the monitoring system from critical infrastructure
  • Regularly rotate passwords stored in the application and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check application version via web interface or configuration files; versions below 7.30 are vulnerable.

Check Version:

Check web interface footer or configuration files for version number

Verify Fix Applied:

After upgrading to 7.30+, verify that password fields in device properties no longer display cleartext when browser is configured to show password fields.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts
  • Unusual access patterns to device properties pages
  • Configuration changes to password fields

Network Indicators:

  • Unusual traffic to web interface from unexpected sources
  • HTTP requests to device properties endpoints

SIEM Query:

source="lpar2rrd" OR source="stor2rrd" AND (event="login_failure" OR url="*device_properties*")

🔗 References

📤 Share & Export