Rapid7 Vulnerability & Exploit Database

Red Hat CloudForms Management Engine 5.1 agent/linuxpkgs Path Traversal

Back to Search

Red Hat CloudForms Management Engine 5.1 agent/linuxpkgs Path Traversal

Disclosed
09/04/2013
Created
05/30/2018

Description

This module exploits a path traversal vulnerability in the "linuxpkgs" action of "agent" controller of the Red Hat CloudForms Management Engine 5.1 (ManageIQ Enterprise Virtualization Manager 5.0 and earlier). It uploads a fake controller to the controllers directory of the Rails application with the encoded payload as an action and sends a request to this action to execute the payload. Optionally, it can also upload a routing file containing a route to the action. (Which is not necessary, since the application already contains a general default route.)

Author(s)

  • Ramon de C Valle <rcvalle@metasploit.com>

Platform

Ruby

Architectures

ruby

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/cfme_manageiq_evm_upload_exec
msf exploit(cfme_manageiq_evm_upload_exec) > show targets
    ...targets...
msf exploit(cfme_manageiq_evm_upload_exec) > set TARGET < target-id >
msf exploit(cfme_manageiq_evm_upload_exec) > show options
    ...show and set options...
msf exploit(cfme_manageiq_evm_upload_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;