Apply updates to make the English a bit neater r.e affected versions. Also applied updates to make the markdown have bullet points so it displays better. Finally modified up the module description to explain the actual issue a bit more, but it might still need work

This commit is contained in:
gwillcox-r7 2020-08-13 15:13:55 -05:00
parent 3c70f37dbe
commit dc21773f10
No known key found for this signature in database
GPG Key ID: D35E05C0F2B81E83
1 changed files with 30 additions and 24 deletions

View File

@ -1,34 +1,41 @@
## Vulnerable Application ## Vulnerable Application
The following [Geutebruck](https://www.geutebrueck.com) products using firmware <= 1.12.0.25 and also the 1.12.13.2 and the 1.12.14.5: The following [Geutebruck](https://www.geutebrueck.com) products using firmware versions <= 1.12.0.25,
Encoder and E2 Series Camera models: firmware version 1.12.13.2 or firmware version 1.12.14.5:
G-Code: * Encoder and E2 Series Camera models:
EEC-2xxx * G-Code:
G-Cam: * EEC-2xxx
EBC-21xx * G-Cam:
EFD-22xx * EBC-21xx
ETHC-22xx * EFD-22xx
EWPC-22xx * ETHC-22xx
* EWPC-22xx
Many brands use the same firmware: Many brands use the same firmware:
UDP Technology (which is also the supplier of the firmware for the other vendors) * UDP Technology (which is also the supplier of the firmware for the other vendors)
Ganz * Ganz
Visualint * Visualint
Cap * Cap
THRIVE Intelligence * THRIVE Intelligence
Sophus * Sophus
VCA * VCA
TripCorps * TripCorps
Sprinx Technologies * Sprinx Technologies
Smartec * Smartec
Riva * Riva
This module has been tested on a Geutebruck 5.02024 G-Cam/EFD-2250 running 1.12.14.5 firmware. This module has been tested on a Geutebruck 5.02024 G-Cam EFD-2250 running firmware version 1.12.14.5.
### Description ### Description
This exploit a simple OS command injection (CVE-2020-16205) in the /uapi-cgi/admin/testaction.cgi page of the web interface. This module exploits an authenticated OS command injection vulnerability (CVE-2020-16205) within the
Here is the advisory: https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03 `server` GET parameter of /uapi-cgi/admin/testaction.cgi when the `type` parameter is set to `ntp`.
This issue occurs due to a lack of validation on the `server` parameter, which allows an attacker to
inject a new line character, followed by the command they wish to execute, at which point the server will
then interpret the new string as a separate command to be executed. Successful exploitation will result in
remote code execution as the `root` user.
Users can find additional details of this vulnerability on the advisory page at https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03.
## Verification Steps ## Verification Steps
@ -58,7 +65,6 @@ The password of the username used to authenticate on the admin page. **Default:
``` ```
msf5 > use exploit/linux/http/geutebruck_testaction_exec msf5 > use exploit/linux/http/geutebruck_testaction_exec
msf5 exploit(linux/http/geutebruck_testaction_exec) >
msf5 exploit(linux/http/geutebruck_testaction_exec) > set payload cmd/unix/reverse_netcat_gaping msf5 exploit(linux/http/geutebruck_testaction_exec) > set payload cmd/unix/reverse_netcat_gaping
payload => cmd/unix/reverse_netcat_gaping payload => cmd/unix/reverse_netcat_gaping
msf5 exploit(linux/http/geutebruck_testaction_exec) > set httpusername root msf5 exploit(linux/http/geutebruck_testaction_exec) > set httpusername root