module

Cogent DataHub Command Injection

Disclosed
Apr 29, 2014
Created
May 30, 2018

Description

This module exploits an injection vulnerability in Cogent DataHub prior
to 7.3.5. The vulnerability exists in the GetPermissions.asp page, which
makes insecure use of the datahub_command function with user controlled
data, allowing execution of arbitrary datahub commands and scripts. This
module has been tested successfully with Cogent DataHub 7.3.4 on
Windows 7 SP1. Please also note that after exploitation, the remote service
will most likely hang and restart manually.

Authors

John Leitch
juan vazquez [email protected]

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/windows/http/cogent_datahub_command
msf exploit(cogent_datahub_command) > show targets
...targets...
msf exploit(cogent_datahub_command) > set TARGET < target-id >
msf exploit(cogent_datahub_command) > show options
...show and set options...
msf exploit(cogent_datahub_command) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.