Vulnerabilities > CVE-2007-3010 - Unspecified vulnerability in Al-Enterprise Omnipcx Enterprise Communication Server

047910
CVSS 9.8 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
al-enterprise
critical
exploit available
metasploit

Summary

masterCGI in the Unified Maintenance Tool in Alcatel OmniPCX Enterprise Communication Server R7.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the user parameter during a ping action.

Exploit-Db

  • descriptionAlcatel-Lucent OmniPCX Enterprise 7.1 Remote Command Execution Vulnerability. CVE-2007-3010. Webapps exploit for cgi platform
    idEDB-ID:30591
    last seen2016-02-03
    modified2007-09-17
    published2007-09-17
    reporterRedTeam Pentesting GmbH
    sourcehttps://www.exploit-db.com/download/30591/
    titleAlcatel-Lucent OmniPCX Enterprise <= 7.1 - Remote Command Execution Vulnerability
  • descriptionAlcatel-Lucent OmniPCX Enterprise Communication Server. CVE-2007-3010. Webapps exploit for cgi platform
    idEDB-ID:10031
    last seen2016-02-01
    modified2007-09-17
    published2007-09-17
    reporterpatrick
    sourcehttps://www.exploit-db.com/download/10031/
    titleAlcatel-Lucent OmniPCX Enterprise Communication Server <= 7.1 - masterCGI Command Injection
  • descriptionAlcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution. CVE-2007-3010. Webapps exploit for cgi platform
    idEDB-ID:16857
    last seen2016-02-02
    modified2010-10-05
    published2010-10-05
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16857/
    titleAlcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution

Metasploit

descriptionThis module abuses a metacharacter injection vulnerability in the HTTP management interface of the Alcatel-Lucent OmniPCX Enterprise Communication Server 7.1 and earlier. The Unified Maintenance Tool contains a 'masterCGI' binary which allows an unauthenticated attacker to execute arbitrary commands by specifying shell metacharaters as the 'user' within the 'ping' action to obtain 'httpd' user access. This module only supports command line payloads, as the httpd process kills the reverse/bind shell spawn after the HTTP 200 OK response.
idMSF:EXPLOIT/LINUX/HTTP/ALCATEL_OMNIPCX_MASTERCGI_EXEC
last seen2020-06-14
modified2017-11-08
published2009-09-01
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/alcatel_omnipcx_mastercgi_exec.rb
titleAlcatel-Lucent OmniPCX Enterprise masterCGI Arbitrary Command Execution

Packetstorm