what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

rapidstream.vpn.txt

rapidstream.vpn.txt
Posted Aug 15, 2000
Authored by Loki

RapidStream VPN nodes has hard-coded the 'rsadmin' account into the sshd binary in the appliance OS. The account has been given a 'null' password in which password assignment and authentication was expected to be handled by the RapidStream software itself. The vendor failed to realize that arbitrary commands could be appended to the ssh string when connecting to the SSH server on the remote vpn. This in effect could lead to many things, including the ability to spawn a remote root shell on the vpn.

tags | exploit, remote, arbitrary, shell, root
SHA-256 | 1fd2ed25e75ae6103e367de4a012acaddbd2dec2b82709822d1d1f127d8cc413

rapidstream.vpn.txt

Change Mirror Download

Date: 8-14-00
Time: 12:40p PST


OVERVIEW
RapidStream has hard-coded the 'rsadmin' account into the sshd binary in the
appliance OS. The account has been given a 'null' password in
which password assignment and authentication was expected to be handled by the
RapidStream software itself. The vendor failed to realize that arbitrary
commands could be appended to the ssh string when connecting to the SSH server
on the remote vpn. This in effect could lead to many things, including the
ability to spawn a remote root shell on the vpn.

e.g. [root@attacker]# ssh -l rsadmin <ip of vpn> "/bin/sh -i;"
e.g. [root@attacker]# ssh -l rsadmin <ip of vpn> "vi /etc/shadow"


SYSTEMS AFFECTED
I have not yet tested this with other VPN appliances that have installed SSH
as their choice for remote access.

1. RapidStream 8000 Family
2. RapidStream 6000 Family
3. RapidStream 4000 Family
4. RapidStream 2000 Family


IMPACT
1. Attacker can use VPN to ftp, and even install and run packet sniffers on the
VPN which will allow him to sniff all traffic coming in and out of the VPN.
Due to the fact that the administrator is not aware of the ability to spawn
root shells, the intruder can go completely undetected.

2. Immediate remote root access to VPN

3. Can download /etc/shadow file to crack accounts including root. This will give
the attacker the default password for all root accounts for all deployed
RapidStream products.

SOLUTION
RapidStream has been contacted and is working on a new revision in which SSHD
comes uninstalled. For those that do not wish to wait can put the VPN appliance
behind a firewall where port 22 has been closed. An alternative is to use the
vulnerability to ssh into the vpn and turn off SSHD yourself.

SHOUTS
#RootHat, Lamagra, Safety, BillyBobCat Pennington, Faisal, Mega, Lockdown, King
Art"hur" and all the gang! "TIMMMY!, LIVIN A LIE!"
Also mad shouts out to muh fiance! "Mahal Kita!"

"Shouts to the fellow herd of the evil cow people, cow go moo!"
moo?


----------------------------------------------------------------------
Loki [LoA]
loki.loa@subdimension.com
----------------------------------------------------------------------
PGP Key fingerprint = 67 1D 12 BE 61 D6 63 B2 6A 8C F8 A1 80 88 1B 4
[jbrill@nasa.gov]# ./crack /etc/passwd > passwd.cr
[jbrill@nasa.gov]# su - root
[root@nasa.gov]#
----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close