Dell iDRAC7/8 Devices - Remote Code Injection
ID: CVE-2018-1207
Severity: critical
Author: dwisiswant0
Tags: cve2018,cve,dell,injection,rce
Description
Section titled “Description”Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerabilitywhich could be used to execute remote code. A remote unauthenticated attacker maypotentially be able to use CGI variables to execute remote code.
YAML Source
Section titled “YAML Source”id: CVE-2018-1207
info: name: Dell iDRAC7/8 Devices - Remote Code Injection author: dwisiswant0 severity: critical description: | Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device. remediation: | Apply the latest firmware updates provided by Dell to mitigate this vulnerability. reference: - https://downloads.dell.com/solutions/dell-management-solution-resources/iDRAC_CVE%201207_1211_1000116.pdf - https://github.com/KraudSecurity/Exploits/blob/master/CVE-2018-1207/CVE-2018-1207.py - https://nvd.nist.gov/vuln/detail/CVE-2018-1207 - http://en.community.dell.com/techcenter/extras/m/white_papers/20485410 - https://twitter.com/nicowaisman/status/977279766792466432 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-1207 cwe-id: CWE-94 epss-score: 0.01875 epss-percentile: 0.88144 cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dell product: emc_idrac7 tags: cve2018,cve,dell,injection,rce
http: - method: GET path: - "{{BaseURL}}/cgi-bin/login?LD_DEBUG=files"
matchers: - type: word part: response words: - "calling init: /lib/"# digest: 4b0a00483046022100a48c4ed46cb11a68648f0811510933642636c807d1ece2e4e8bf6b4bf0e7f153022100ea4913bbf2c783c8117916896f458a5d37778cdbf3bf49a8a58eceb966da2667:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-1207.yaml"