vendor:
Avaya Aura Communication Manager
by:
Sarang Tumne a.k.a SarT
9.8
CVSS
CRITICAL
Shellshock Exploit
78
CWE
Product Name: Avaya Aura Communication Manager
Affected Version From: 5.2
Affected Version To: 5.2
Patch Exists: YES
Related CWE: CVE-2014-6271
CPE: a:avaya:aura_communication_manager
Metasploit:
https://www.rapid7.com/db/vulnerabilities/freebsd-vid-81e2b308-4a6c-11e4-b711-6805ca0b3d42/, https://www.rapid7.com/db/vulnerabilities/gnu-bash-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/pulse-secure-pulse-connect-secure-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3094/, https://www.rapid7.com/db/vulnerabilities/cisco-xe-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3093/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-2380-1/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3092/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-512d1301-49b9-11e4-ae2c-c80aa9043978/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-1354/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/gnu-bash-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/cisco-xe-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/hpsim-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-6277/, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=2, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=3, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=4, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=2
Other Scripts:
N/A
Platforms Tested: None
2020
Avaya Aura Communication Manager 5.2 – Remote Code Execution
This exploit generates a reverse shell to a nc listener by exploiting the Shellshock vulnerability in Avaya Aura Communication Manager 5.2. It takes three arguments - Victim's IP, Attacker's IP and Reverse Shell Port.
Mitigation:
Avaya has released an advisory for this vulnerability and recommends users to upgrade to the latest version of Avaya Aura Communication Manager.