module

Watchguard XCS Remote Command Execution

Disclosed
2015-06-29
Created
2018-05-30

Description

This module exploits two separate vulnerabilities found in the Watchguard XCS virtual
appliance to gain command execution. By exploiting an unauthenticated SQL injection, a
remote attacker may insert a valid web user into the appliance database, and get access
to the web interface. On the other hand, a vulnerability in the web interface allows the
attacker to inject operating system commands as the 'nobody' user.

Author

Daniel Jensen daniel.jensen@security-assessment.com

Platform

BSD

Architectures

x64

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/freebsd/http/watchguard_cmd_exec
msf exploit(watchguard_cmd_exec) > show targets
...targets...
msf exploit(watchguard_cmd_exec) > set TARGET < target-id >
msf exploit(watchguard_cmd_exec) > show options
...show and set options...
msf exploit(watchguard_cmd_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.