New Relic: stamp2-azure-ext.newrelic.com is vulnerable to MS12-020
2018-07-21T07:33:11
ID H1:384882 Type hackerone Reporter scrszy Modified 2018-07-24T23:09:29
Description
Hi security team member,
On stamp2-azure-ext.newrelic.com, there is running Windows Server 2008, which is vulnerable to MS12-020.
{F322944}
Step to reproduce
To show exploit, the server will shut down.
1- Download the attached file with the name MS12-020.rb
2- Run the below command on terminal
ruby MS12-020.rb stamp2-azure-ext.newrelic.com
The above command will shut down the server. So keep in mind before doing anything.
Let me know if more information is needed to my end.
Thanks
Impact
An attacker is able to shut down the server. Also he/she can get access of server after restart.
{"id": "H1:384882", "type": "hackerone", "bulletinFamily": "bugbounty", "title": "New Relic: stamp2-azure-ext.newrelic.com is vulnerable to MS12-020", "description": "Hi security team member,\n\nOn stamp2-azure-ext.newrelic.com, there is running Windows Server 2008, which is vulnerable to MS12-020.\n{F322944}\n\n#Step to reproduce\nTo show exploit, the server will shut down.\n1- Download the attached file with the name MS12-020.rb\n2- Run the below command on terminal\n`ruby MS12-020.rb stamp2-azure-ext.newrelic.com`\n\nThe above command will shut down the server. So keep in mind before doing anything.\nLet me know if more information is needed to my end.\nThanks\n\n## Impact\n\nAn attacker is able to shut down the server. Also he/she can get access of server after restart.", "published": "2018-07-21T07:33:11", "modified": "2018-07-24T23:09:29", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://hackerone.com/reports/384882", "reporter": "scrszy", "references": [], "cvelist": [], "lastseen": "2018-07-25T04:35:01", "viewCount": 10, "enchantments": {"score": {"value": 1.2, "vector": "NONE", "modified": "2018-07-25T04:35:01", "rev": 2}, "dependencies": {"references": [], "modified": "2018-07-25T04:35:01", "rev": 2}, "vulnersScore": 1.2}, "bounty": 0.0, "bountyState": "resolved", "h1team": {"handle": "newrelic", "profile_picture_urls": {"medium": "https://profile-photos.hackerone-user-content.com/000/017/011/94822999c270d791d185b40e07d36cc864e96faa_medium.?1482361910", "small": "https://profile-photos.hackerone-user-content.com/000/017/011/4a259e2f731f105c784b1279db99215cefb8abbd_small.?1482361910"}, "url": "https://hackerone.com/newrelic"}, "h1reporter": {"disabled": false, "hacker_mediation": false, "hackerone_triager": false, "is_me?": false, "profile_picture_urls": {"small": "https://profile-photos.hackerone-user-content.com/000/117/359/7c42cdc8279590620ae9a0fb9517e6dfc005d5c6_small.jpg?1492596116"}, "url": "/scrszy", "username": "scrszy"}, "immutableFields": []}