exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

vpn-root.txt

vpn-root.txt
Posted Aug 31, 2000
Authored by Loki

RapidStream has hard-coded the 'rsadmin' account into the sshd binary in the appliance OS. The account has been given a 'null' password in which password assignment and authentication was expected to be handled by the RapidStream software itself. The vendor failed to realize that arbitrary commands could be appended to the ssh string when connecting to the SSH server on the remote vpn. This in effect could lead to many things, including the ability to spawn a remote root shell on the vpn.

tags | exploit, remote, arbitrary, shell, root
SHA-256 | 4b922cd0b6565086e642ee2ff57903babce23e38618ab193b67f145f89db55fd

vpn-root.txt

Change Mirror Download
  Date: 8-14-00
Time: 12:40p PST

*/ You have been infected by the Bubonic Loki /*


OVERVIEW
---------

RapidStream has hard-coded the 'rsadmin' account into the sshd
binary in the appliance OS. The account has been given a 'null' password
in which password assignment and authentication was expected to be
handled by the RapidStream software itself. The vendor failed to realize that
arbitrary commands could be appended to the ssh string when connecting to
the SSH server on the remote vpn. This in effect could lead to many things,
including the ability to spawn a remote root shell on the vpn.

e.g. [root@attacker]# ssh -l rsadmin <ip of vpn> "/bin/sh -i;"
e.g. [root@attacker]# ssh -l rsadmin <ip of vpn> "vi /etc/shadow"


SYSTEMS AFFECTED
I have not yet tested this with other VPN appliances that have
installed SSH as their choice for remote access.

1. RapidStream 8000 Family
2. RapidStream 6000 Family
3. RapidStream 4000 Family
4. RapidStream 2000 Family


IMPACT
------

1. Attacker can use VPN to ftp, and even install and run packet
sniffers on the VPN which will allow him to sniff all traffic coming in and out
of the VPN. Due to the fact that the administrator is not aware of the
ability to spawn root shells, the intruder can go completely undetected.

2. Immediate remote root access to VPN

3. Can download /etc/shadow file to crack accounts including
root. This will give the attacker the default password for all root accounts for all
deployed RapidStream products.

SOLUTION
---------

RapidStream has been contacted and is working on a new revision
in which SSHD comes uninstalled. For those that do not wish to wait can put the
VPN appliance behind a firewall where port 22 has been closed. An alternative
is to use the vulnerability to ssh into the vpn and turn off SSHD yourself.

SHOUTS
#RootHat, Lamagra, Safety, BillyBobCat Pennington, Faisal, Mega,
Lockdown, King
Art"hur" and all the gang! "TIMMMY!, LIVIN A LIE!"
Also mad shouts out to muh fiance! "Mahal Kita!"

"Shouts to the fellow herd of the evil cow people, cow go moo!"
moo?


----------------------------------------------------------------------
Loki [LoA]
loki.loa@subdimension.com
----------------------------------------------------------------------
PGP Key fingerprint = 67 1D 12 BE 61 D6 63 B2 6A 8C F8 A1 80 88 1B 4
----------------------------------------------------------------------
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close