0day.today - 世界最大的漏洞利用数据库。
![](/img/logo_green.jpg)
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币金币
本站管理员使用官方账号。请谨防诈骗!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Endian Firewall Proxy Password Change Command Injection Exploit
[ 0Day-ID-24211 ]
完整标题
Endian Firewall Proxy Password Change Command Injection Exploit
[ 置顶 ]
置顶 - 是一项付费服务,可以使你的材料有更多访问者。
价格:
10
价格:
![](/img/gold.gif)
添加日期
平台
已确认
![](/img/check.png)
价格
免费
风险
![](/img/risk/critlow_3.gif)
安全风险级别 - 高
]Rel. releases
描述
This Metasploit module exploits an OS command injection vulnerability in a web-accessible CGI script used to change passwords for locally-defined proxy user accounts. Valid credentials for such an account are required. Command execution will be in the context of the "nobody" account, but this account had broad sudo permissions, including to run the script /usr/local/bin/chrootpasswd (which changes the password for the Linux root account on the system to the value specified by console input once it is executed). The password for the proxy user account specified will *not* be changed by the use of this module, as long as the target system is vulnerable to the exploit. Very early versions of Endian Firewall (e.g. 1.1 RC5) require HTTP basic auth credentials as well to exploit this vulnerability. Use the USERNAME and PASSWORD advanced options to specify these values if required. Versions >= 3.0.0 still contain the vulnerable code, but it appears to never be executed due to a bug in the vulnerable CGI script which also prevents normal use (http://jira.endian.com/browse/UTM-1002). Versions 2.3.x and 2.4.0 are not vulnerable because of a similar bug (http://bugs.endian.com/print_bug_page.php?bug_id=3083). Tested successfully against the following versions of EFW Community: 1.1 RC5, 2.0, 2.1, 2.2, 2.5.1, 2.5.2. Should function against any version from 1.1 RC5 to 2.2.x, as well as 2.4.1 and 2.5.x.
CVE
CVE-2015-5082
其他信息
投诉
0
评论
0
视角
4 147
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
免费
开放此漏洞利用
你可以免费开放此漏洞利用的代码
你可以免费开放此漏洞利用的代码
![](/img/check_16.png)
已经0day.today 漏洞数据库 : 漏洞 : 0day : 最新漏洞利用 : 购买出售私有漏洞利用 : Inj3ct0r团队的shellcode站管理员确认
此材料已经管理员查验,并证明绝对有效。
此材料已经管理员查验,并证明绝对有效。
[ 评论: 0 ]
评论须知:
- 用户不得在此交换个人联系方式
- 禁止在此谈论其它网站/项目的交易价格
- 禁止转售
登录或注册后即可发表评论
登录或注册后即可发表评论