Skip to content
This repository has been archived by the owner on Jan 16, 2025. It is now read-only.

Add SSH exploit for CVE-2018-7105 #13

Merged
merged 2 commits into from
Jan 8, 2019

Conversation

fishilico
Copy link
Contributor

Hi,
This pull request adds a script which uses CVE-2018-7105 to add a new command, "Please", which can be used to read files on iLO filesystem and to perform DMA accesses to the main RAM.
exploit_ssh.py uses 2 stages of payload:

  • "stage 1" is implemented in ARM assembly, is written using a printf format string vulnerability in ConAppCLI.bss, and allows writing and executing the second stage.
  • "stage 2" is implemented in C and implements several commands.

This script requires an administrator account on the iLO (in order to create a new user with a special name).

Use CVE-2018-7105 to add a new command, "Please", which can be used to
read files on iLO filesystem and to perform DMA accesses to the main
RAM.
exploit_ssh.py uses 2 stages of payload:
- "stage 1" is implemented in ARM assembly, is written using a printf
  format string vulnerability in ConAppCLI.bss, and allows writing and
  executing the second stage.
- "stage 2" is implemented in C and implements several commands.

This script requires an administrator account on the iLO (in order to
create a new user with a special name).
@0xf4b 0xf4b merged commit 3683e3b into airbus-seclab:master Jan 8, 2019
@fishilico fishilico deleted the CVE-2018-7105 branch January 8, 2019 15:23
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants