Add doc file for fu exploit
parent
15d4ca9070
commit
272121911d
|
@ -0,0 +1,21 @@
|
|||
# Nuuo CMS Authenticated Arbitrary File Upload
|
||||
|
||||
The COMMITCONFIG verb is used by a CMS client to upload and modify the configuration of the CMS Server. An example is below:
|
||||
|
||||
COMMITCONFIG NUCM/1.0
|
||||
User-Session-No: <session-number>
|
||||
Filename: <filename>
|
||||
FileType: <number>
|
||||
Content-Lenght: <file-length>
|
||||
<FILE_DATA>
|
||||
|
||||
The vulnerability is in the "FileName" parameter, which accepts directory traversal (..\\..\\) characters. Therefore, this function can be abused to overwrite any files in the installation drive of CMS Server.
|
||||
|
||||
Note that this exploit will destroy the CMS installation - it will replace a key DLL!
|
||||
This vulnerability is exploitable in CMS versions up to and including v2.4.
|
||||
|
||||
This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided.
|
||||
|
||||
## References
|
||||
https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02
|
||||
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt
|
Loading…
Reference in New Issue