SA500 vulnerabilities - details

看板Bugtraq作者時間14年前 (2011/07/28 02:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
Hi Advisory by Cisco was published a few days ago (Bugtraq ID: 48810). Now more details: 1. Unathenticated access to web management (any user - including admin). Due to blind SQLi in the login form of web management (port 443, https, login field, embedded sqlite DB), there is possible to obtain: a) all logins b) all passwords (which are kept in the DB in plaintext) c) other data stored in internal DB 2. Privilege escalation to OS root level. Having access to any user on the target system (including guest user), it is possible to get full OS root access by injection in ping/traceroute/dns lookup functionalities. User interface prohibits such injections, but viewing / modifying http requests in raw form allows to bypass that restriction. More datailed information - including screenshots: http://www.securitum.pl/dh/cisco_sa500_hacking -- Michal Sajdak, Securitum
文章代碼(AID): #1EC5cYF6 (Bugtraq)