Vulnerabilities > CVE-2000-0945 - Unspecified vulnerability in Cisco Catalyst 3500 XL

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
cisco
critical
nessus
exploit available
metasploit

Summary

The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.

Vulnerable Configurations

Part Description Count
Hardware
Cisco
1

Exploit-Db

descriptionCisco Catalyst 3500 XL Remote Arbitrary Command Execution Vulnerability. CVE-2000-0945. Remote exploit for hardware platform
idEDB-ID:20330
last seen2016-02-02
modified2000-10-26
published2000-10-26
reporterblackangels
sourcehttps://www.exploit-db.com/download/20330/
titleCisco Catalyst 3500 XL Remote Arbitrary Command Execution Vulnerability

Metasploit

descriptionThis module gathers data from a Cisco device (router or switch) with the device manager web interface exposed. The HttpUsername and HttpPassword options can be used to specify authentication.
idMSF:AUXILIARY/SCANNER/HTTP/CISCO_DEVICE_MANAGER
last seen2020-04-11
modified2018-10-16
published2010-12-11
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0945
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/cisco_device_manager.rb
titleCisco Device HTTP Device Manager Access

Nessus

NASL familyCISCO
NASL idCISCO_CATALYST.NASL
descriptionThe remote device appears to be a Cisco Catalyst. It is possible to execute arbitrary commands on the router by requesting them via HTTP, as in : /exec/show/config/cr This command shows the configuration file, which contains passwords. A remote attacker could use this flaw to take control of the router.
last seen2020-06-01
modified2020-06-02
plugin id10545
published2000-11-10
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10545
titleCisco Catalyst Web Interface Remote Command Execution
code
#
# (C) Tenable Network Security, Inc.
#

#
# UNTESTED!
#


include("compat.inc");


if(description)
{
 script_id(10545);
 script_version ("1.38");
 script_cve_id("CVE-2000-0945");
 script_bugtraq_id(1846);

 script_name(english:"Cisco Catalyst Web Interface Remote Command Execution");
 script_summary(english:"Obtains the remote router configuration");
 
 script_set_attribute(
   attribute:"synopsis",
   value:"The remote router has a command execution vulnerability."
 );
 script_set_attribute(attribute:"description", value:
"The remote device appears to be a Cisco Catalyst.  It is
possible to execute arbitrary commands on the router by requesting
them via HTTP, as in :

  /exec/show/config/cr

This command shows the configuration file, which contains passwords.
A remote attacker could use this flaw to take control of the router." );
 script_set_attribute(
   attribute:"see_also",
   value:"https://seclists.org/bugtraq/2000/Oct/393"
 );
 # https://web.archive.org/web/20001110134500/http://www.cisco.com/warp/public/cc/pd/si/casi/ca3500xl/index.shtml
 script_set_attribute(
   attribute:"see_also",
   value:"http://www.nessus.org/u?3b59f033"
 );
 script_set_attribute(
   attribute:"solution", 
   value:"Disable the web configuration interface."
 );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2000/11/10");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/10/26");
 script_cvs_date("Date: 2018/11/15 20:50:20");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/h:cisco:catalyst_3500_xl");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english:"CISCO");
 script_dependencie("http_version.nasl");
 script_require_ports("Services/www", 80);
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80, embedded: 1);
if(get_port_state(port))
{
 banner = get_http_banner(port:port);
 if ( "cisco-IOS" >!< banner ) exit(0);

 soc = http_open_socket(port);
 if(soc)
 {
  r = http_send_recv3(method:"GET", item:"/exec/show/config/cr", port:port);

  if(("enable" >< r) &&
     ("interface" >< r) &&
     ("ip address" >< r))security_hole(port);
  }
}

Saint

bid1846
descriptionCisco IOS HTTP exec path command execution
idnet_cisco_webcmd
osvdb444
titlecisco_ios_http_exec
typeremote