Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/gather/cisco_pvc2300_download_config.md
Views: 11784
Vulnerable Application
This module exploits an information disclosure vulnerability in Cisco PVC2300 cameras in order to download the configuration file containing the admin credentials for the web interface.
The module first performs a basic check to see if the target is likely Cisco PVC2300. If so, the module attempts to obtain a sessionID via an HTTP GET request to the vulnerable /oamp/System.xml endpoint using the login
action and the hardcoded credentials L1_admin:L1_51
.
If a session ID is obtained, the module uses it in another HTTP GET request to /oamp/System.xml that uses the downloadConfigurationFile
action in an attempt to download the configuration file.
The configuration file, if obtained, will be encdoded using base64 with a non-standard alphabet. In order to decode it, the module first translates the encoded configuration file from the default base64 alphabet to the custom alphabet. Then the configuration file is decoded using regular base64 and subsequently stored in the loot
folder.
Finally, the module attempts to extract the admin credentials to the web interface from the decoded configuration file.
No known solution was made available for this vulnerability and no CVE has been published. It is therefore likely that most (if not all) Cisco PVC2300 cameras are affected.
This module was successfully tested against several Cisco PVC2300 cameras.
Options
No non-default options are configured.
Verification Steps
Start msfconsole
Do:
use auxiliary/gather/cisco_pvc2300_download_config
Do:
set RHOSTS [IP]
Do:
run