vendor:
Cuckoo Sandbox
by:
Rémi ROCHER, Thomas MARTHÉLY
7.5
CVSS
HIGH
Remote Code Execution
CWE
Product Name: Cuckoo Sandbox
Affected Version From: <= 2.0.1
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: MS Windows 7, MS Windows 10
2016
Cuckoo Sandbox Guest XMLRPC Privileged RCE PoC
This exploit allows an attacker to spawn a calc.exe process with Administrator privileges on Cuckoo Sandbox versions <= 2.0.1. The exploit assumes that the Cuckoo agent.py is running with Admin privileges and the current user can access a local interface. Additionally, for true Remote Code Execution, external equipment must be able to access the XMLRPC port (default 8000). The exploit can be used to trick the detection system, potentially escape the sandbox machine, or attack sensitive systems.
Mitigation:
Upgrade Cuckoo Sandbox to a version higher than 2.0.1. Limit access to the XMLRPC port to trusted sources.