vendor:
OmniPCX Enterprise Communication Server
by:
patrick
7.5
CVSS
HIGH
Metacharacter Injection
78
CWE
Product Name: OmniPCX Enterprise Communication Server
Affected Version From: 7.1 and earlier
Affected Version To: 7.1 and earlier
Patch Exists: YES
Related CWE: CVE-2007-3010
CPE: a:alcatel-lucent:omnipcx_enterprise
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/linux/http/alcatel_omnipcx_mastercgi_exec, https://www.infosecmatter.com/list-of-metasploit-linux-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=71859, https://www.infosecmatter.com/nessus-plugin-library/?id=71861
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Unix
2007
Alcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution
This module abuses a metacharacter injection vulnerability in the HTTP management interface of the Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 and earlier. The Unified Maintenance Tool contains a 'masterCGI' binary which allows an unauthenticated attacker to execute arbitrary commands by specifing shell metacharaters as the 'user' within the 'ping' action to obtain 'httpd' user access. This module only supports command line payloads, as the httpd process kills the reverse/bind shell spawn after the HTTP 200 OK response.
Mitigation:
Upgrade to the latest version of Alcatel-Lucent OmniPCX Enterprise Communication Server