module

SolarWinds LEM Default SSH Password Remote Code Execution

Disclosed
2017-03-17
Created
2018-05-30

Description

This module exploits the default credentials of SolarWinds LEM. A menu system is encountered when the SSH
service is accessed with the default username and password which is "cmc" and "password". By exploiting a
vulnerability that exist on the menuing script, an attacker can escape from restricted shell.

This module was tested against SolarWinds LEM v6.3.1.

Author

Mehmet Ince mehmet@mehmetince.net

Platform

Python

Architectures

python

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/ssh/solarwinds_lem_exec
msf exploit(solarwinds_lem_exec) > show targets
...targets...
msf exploit(solarwinds_lem_exec) > set TARGET < target-id >
msf exploit(solarwinds_lem_exec) > show options
...show and set options...
msf exploit(solarwinds_lem_exec) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.