
24 changes to exploits/shellcodes/ghdb ASUS ASMB8 iKVM 1.14.51 - Remote Code Execution (RCE) Ruckus IoT Controller 1.7.1.0 - Undocumented Backdoor Account Dell EMC iDRAC7/iDRAC8 2.52.52.52 - Remote Code Execution (RCE) FLIR AX8 1.46.16 - Remote Command Injection ABB Cylon Aspect 3.08.02 - Cross-Site Request Forgery (CSRF) Ethercreative Logs 3.0.3 - Path Traversal Garage Management System 1.0 (categoriesName) - Stored XSS Nagios Log Server 2024R1.3.1 - Stored XSS ProConf 6.0 - Insecure Direct Object Reference (IDOR) Teedy 1.11 - Account Takeover via Stored Cross-Site Scripting (XSS) WooCommerce Customers Manager 29.4 - Post-Authenticated SQL Injection ABB Cylon Aspect 3.08.03 (webServerDeviceLabelUpdate.php) - File Write DoS ABB Cylon Aspect 4.00.00 (factorySaved.php) - Unauthenticated XSS ABB Cylon Aspect 4.00.00 (factorySetSerialNum.php) - Remote Code Execution Car Rental Project 1.0 - Remote Code Execution KodExplorer 4.52 - Open Redirect NagVis 1.9.33 - Arbitrary File Read phpMyFAQ 3.1.7 - Reflected Cross-Site Scripting (XSS) phpMyFAQ 3.2.10 - Unintended File Download Triggered by Embedded Frames Smart Manager 8.27.0 - Post-Authenticated SQL Injection Zabbix 7.0.0 - SQL Injection Hugging Face Transformers MobileViTV2 4.41.1 - Remote Code Execution (RCE) Fortinet FortiOS_ FortiProxy_ and FortiSwitchManager 7.2.0 - Authentication bypass WebMethods Integration Server 10.15.0.0000-0092 - Improper Access on Login Page
110 lines
No EOL
6 KiB
Text
110 lines
No EOL
6 KiB
Text
# Exploit Title: CommScope Ruckus IoT Controller 1.7.1.0 - Undocumented Account
|
|
# Date: 2021.05.26
|
|
# Exploit Author: korelogic
|
|
# Vendor Homepage: https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf
|
|
# Affected Product: Ruckus IoT Controller
|
|
# Version: 1.7.1.0 and earlier
|
|
# Tested on: Linux
|
|
# CVE : CVE-2021-33216,CVE-2019-1000018
|
|
|
|
|
|
KL-001-2021-007: CommScope Ruckus IoT Controller Undocumented Account
|
|
Advisory ID: KL-001-2021-007
|
|
Publication Date: 2021.05.26
|
|
Publication URL: https://korelogic.com/Resources/Advisories/KL-001-2021-007.txt
|
|
1. Vulnerability Details
|
|
Affected Vendor: CommScope
|
|
Affected Product: Ruckus IoT Controller
|
|
Affected Version: 1.7.1.0 and earlier
|
|
Platform: Linux
|
|
CWE Classification: CWE-798: Use of Hard-coded Credentials, CWE-912: Hidden Functionality
|
|
CVE ID: CVE-2021-33216
|
|
2. Vulnerability Description
|
|
An upgrade account is included in the IoT Controller OVA that
|
|
provides the vendor undocumented access via Secure Copy (SCP).
|
|
3. Technical Description
|
|
Once the OVA is imported into VirtualBox, a VMDK file is
|
|
created. The VMDK file can be mounted and the directory
|
|
structure and its contents can be perused.
|
|
An authorized_keys file exists that allows an
|
|
individual/organization possessing the SSH private key to
|
|
access the virtual appliance using the 'vriotiotupgrade'
|
|
account. The 'vriotiotupgrade' account is restricted to scp,
|
|
per the rssh configuration.
|
|
Additionally, it appears that the IoT Controller has rssh version 2.3.4
|
|
installed and in use. At the time of this advisory, there are at least
|
|
three remote command injection vulnerabilities in this particular version
|
|
of rssh: CVE-2019-3463, CVE-2019-3464 and CVE-2019-1000018.
|
|
4. Mitigation and Remediation Recommendation
|
|
The vendor has released an updated firmware (1.8.0.0) which
|
|
remediates the described vulnerability. Firmware and release
|
|
notes are available at:
|
|
https://www.commscope.com/globalassets/digizuite/917216-faq-security-advisory-id-20210525-v1-0.pdf
|
|
5. Credit
|
|
This vulnerability was discovered by Jim Becher (@jimbecher)
|
|
of KoreLogic, Inc.
|
|
6. Disclosure Timeline
|
|
2021.03.30 - KoreLogic submits vulnerability details to
|
|
CommScope.
|
|
2021.03.30 - CommScope acknowledges receipt and the intention
|
|
to investigate.
|
|
2021.04.06 - CommScope notifies KoreLogic that this issue,
|
|
along with several others reported by KoreLogic,
|
|
will require more than the standard 45 business
|
|
day remediation timeline.
|
|
2021.04.06 - KoreLogic agrees to extend disclosure embargo if
|
|
necessary.
|
|
2021.04.30 - CommScope informs KoreLogic that remediation for
|
|
this vulnerability will be available inside of the
|
|
standard 45 business day timeline. Requests
|
|
KoreLogic acquire CVE number for this
|
|
vulnerability.
|
|
2021.05.14 - 30 business days have elapsed since the
|
|
vulnerability was reported to CommScope.
|
|
2021.05.17 - CommScope notifies KoreLogic that the patched
|
|
version of the firmware will be available the week
|
|
of 2021.05.24.
|
|
2021.05.19 - KoreLogic requests CVE from MITRE.
|
|
2021.05.19 - MITRE issues CVE-2021-33216.
|
|
2021.05.25 - CommScope releases firmware 1.8.0.0 and associated
|
|
advisory.
|
|
2021.05.26 - KoreLogic public disclosure.
|
|
7. Proof of Concept
|
|
With the VMDK file mounted at the current working directory:
|
|
$ find . -name authorized_keys
|
|
./VRIOT/ap-images/authorized_keys
|
|
./VRIOT/ops/ap-images/authorized_keys
|
|
$ cat VRIOT/ap-images/authorized_keys
|
|
ssh-rsa
|
|
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
|
|
chandini.venkatesh@commscope.com
|
|
$ cat VRIOT/ops/ap-images/authorized_keys
|
|
ssh-rsa
|
|
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
|
|
chandini.venkatesh@commscope.com
|
|
$ grep "ap-images" etc/passwd
|
|
vriotiotupgrade:x:1002:1002::/VRIOT/ap-images/:/usr/bin/rssh
|
|
$ tail -8 etc/ssh/sshd_config
|
|
Match User vriotiotupgrade
|
|
PasswordAuthentication no
|
|
AuthorizedKeysFile /VRIOT/ap-images/authorized_keys
|
|
Match User vriotha
|
|
PasswordAuthentication yes
|
|
$ grep -v ^# etc/rssh.conf
|
|
logfacility = LOG_USER
|
|
allowscp
|
|
umask = 022
|
|
The contents of this advisory are copyright(c) 2021
|
|
KoreLogic, Inc. and are licensed under a Creative Commons
|
|
Attribution Share-Alike 4.0 (United States) License:
|
|
http://creativecommons.org/licenses/by-sa/4.0/
|
|
KoreLogic, Inc. is a founder-owned and operated company with a
|
|
proven track record of providing security services to entities
|
|
ranging from Fortune 500 to small and mid-sized companies. We
|
|
are a highly skilled team of senior security consultants doing
|
|
by-hand security assessments for the most important networks in
|
|
the U.S. and around the world. We are also developers of various
|
|
tools and resources aimed at helping the security community.
|
|
https://www.korelogic.com/about-korelogic.html
|
|
Our public vulnerability disclosure policy is available at:
|
|
https://korelogic.com/KoreLogic-Public-Vulnerability-Disclosure-Policy.v2.3.txt |