Skip to content

Cisco Bug: CSCur90888 - Cisco UCS Manager Remote Command Execution Vulnerability

Notifications You must be signed in to change notification settings

fuzzlove/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 

Repository files navigation

Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution - Cisco Bug: CSCur90888

  • Exploit Title : Cisco UCS Manager - 2.2(1d) - Remote Command Execution

  • Description : An unspecified CGI script in Cisco FX-OS before 1.1.2 on Firepower 9000 devices and Cisco Unified Computing System (UCS) Manager before 2.2(4b), 2.2(5) before 2.2(5a), and 3.0 before 3.0(2e) allows remote attackers to execute arbitrary shell commands via a crafted HTTP request, aka Bug ID CSCur90888.

  • Date : 1/15/2021

  • Exploit Author : liquidsky (J.McPeters)

  • Vulnerable Software : Cisco UCS Manager - 2.2(1d) -> [According to the vendor (cisco), this is known to impact versions prior to 3.0(2e).]

  • Vendor Homepage : https://www.cisco.com/c/en/us/products/servers-unified-computing/ucs-manager/index.html

  • Version : 2.2(1d), 2.2(3c)A

  • Cisco Reference : https://quickview.cloudapps.cisco.com/quickview/bug/CSCur90888

  • Tested On : Cisco UCS Manager - 2.2(1d) (Exploit ran with Debian 5.6.7-1kali1 (Kali 2020.1 x64))

  • Author Site : https://github.com/fuzzlove/Cisco-UCS-Manager-2.2-1d-Remote-Command-Execution

  • Special Notes : This application by default uses outdated TLS 1.0 for communication, so thats why there is a quickfix/temporary patch to 1.0 in openssl utilizing 'sed' (that gets changes back after exploitation).

  • Greetz: wetw0rk, Fr13ndz, O.G.Xx25, MS, SS, JK, the S3 family, and last but NOT least droppunx ^_~

About

Cisco Bug: CSCur90888 - Cisco UCS Manager Remote Command Execution Vulnerability

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages