Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
BID:25694
Info
Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
| Bugtraq ID: | 25694 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-3010 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 17 2007 12:00AM |
| Updated: | Sep 17 2007 11:10PM |
| Credit: | RedTeam Pentesting GmbH is credited with the discovery of this issue. |
| Vulnerable: |
Alcatel-Lucent OmniPCX Enterprise 7.1 Alcatel-Lucent OmniPCX Enterprise 7.0 Alcatel-Lucent OmniPCX Enterprise 7 Alcatel-Lucent OmniPCX Enterprise 6.2 Alcatel-Lucent OmniPCX Enterprise 6.1 Alcatel-Lucent OmniPCX Enterprise 6.0 Alcatel-Lucent OmniPCX Enterprise 0 |
| Not Vulnerable: |
Alcatel-Lucent OmniPCX Enterprise 7.1 patch F5.401.19 Alcatel-Lucent OmniPCX Enterprise 6.2 patch F3.301.37 Alcatel-Lucent OmniPCX Enterprise 6.1 patch F2.502.32 |
Discussion
Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
Alcatel-Lucent OmniPCX Enterprise is prone to a remote command-execution vulnerability because it fails to adequately sanitize user-supplied data.
Attackers can exploit this issue to execute arbitrary commands with the privileges of the 'httpd' user. Successful attacks may facilitate a compromise of the application and underlying webserver; other attacks are also possible.
Alcatel-Lucent OmniPCX Enterprise R7.1 and prior versions are vulnerable to this issue.
Alcatel-Lucent OmniPCX Enterprise is prone to a remote command-execution vulnerability because it fails to adequately sanitize user-supplied data.
Attackers can exploit this issue to execute arbitrary commands with the privileges of the 'httpd' user. Successful attacks may facilitate a compromise of the application and underlying webserver; other attacks are also possible.
Alcatel-Lucent OmniPCX Enterprise R7.1 and prior versions are vulnerable to this issue.
Exploit / POC
Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
An attacker can exploit this issue via a browser.
The following command demonstrates this issue:
curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=;ls\${IFS}-l;"
An attacker can exploit this issue via a browser.
The following command demonstrates this issue:
curl -k "https://www.example.com/cgi-bin/masterCGI?ping=nomip&user=;ls\${IFS}-l;"
Solution / Fix
Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
Solution:
The vendor has released an advisory along with fixes to address this issue. Please see the referenced advisory for information on obtaining fixes.
Solution:
The vendor has released an advisory along with fixes to address this issue. Please see the referenced advisory for information on obtaining fixes.
References
Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
References:
References:
- OmniPCX Enterprise Product Page (Alcatel-Lucent)
- Alcatel-Lucent OmniPCX Remote Command Execution (RedTeam Pentesting GmbH
) - Shell injection vulnerability in OmniPCX Enterprise (Alcatel-Lucent)