module

IBM Tivoli Endpoint Manager POST Query Buffer Overflow

Disclosed
2011-05-31
Created
2018-05-30

Description

This module exploits a stack based buffer overflow in the way IBM Tivoli
Endpoint Manager versions 3.7.1, 4.1, 4.1.1, 4.3.1 handles long POST query
arguments.

This issue can be triggered by sending a specially crafted HTTP POST request to
the service (lcfd.exe) listening on TCP port 9495. To trigger this issue authorization
is required. This exploit makes use of a second vulnerability, a hardcoded account
(tivoli/boss) is used to bypass the authorization restriction.

Authors

bannedit bannedit@metasploit.com
Jeremy Brown 0xjbrown@gmail.com

Platform

Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/http/ibm_tivoli_endpoint_bof
msf exploit(ibm_tivoli_endpoint_bof) > show targets
...targets...
msf exploit(ibm_tivoli_endpoint_bof) > set TARGET < target-id >
msf exploit(ibm_tivoli_endpoint_bof) > show options
...show and set options...
msf exploit(ibm_tivoli_endpoint_bof) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.