vendor:
Endian Firewall
by:
Ben Lincoln
7.5
CVSS
HIGH
OS Command Injection
78
CWE
Product Name: Endian Firewall
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux
2015
Endian Firewall Proxy User Password Change (/cgi-bin/chpasswd.cgi) Exploit
This exploit allows an attacker to inject a reverse TCP shell into the Endian Firewall Proxy User Password Change page (/cgi-bin/chpasswd.cgi). The attacker must have knowledge of a valid proxy username and password on the target Endian Firewall. The exploit works by sending a maliciously crafted POST request to the chpasswd.cgi page, which contains a command injection payload. This payload will execute a reverse TCP shell to the attacker's specified IP and port.
Mitigation:
Ensure that all web applications are kept up to date with the latest security patches. Additionally, ensure that all web applications are configured securely and that all users have the least privileges necessary to perform their job functions.