Vulnerabilities > CVE-2014-5073 - Remote Command Execution vulnerability in VMTurbo Operations Manager '/cgi-bin/vmtadmin.cgi'

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
vmturbo
exploit available
metasploit

Summary

vmtadmin.cgi in VMTurbo Operations Manager before 4.6 build 28657 allows remote attackers to execute arbitrary commands via shell metacharacters in the fileDate parameter in a DOWN call. <a href="http://cwe.mitre.org/data/definitions/77.html" target="_blank">CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')</a>

Vulnerable Configurations

Part Description Count
Application
Vmturbo
4

Exploit-Db

descriptionVMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution. CVE-2014-5073. Remote exploit for linux platform
fileexploits/linux/remote/34335.rb
idEDB-ID:34335
last seen2016-02-03
modified2014-08-14
platformlinux
port80
published2014-08-14
reportermetasploit
sourcehttps://www.exploit-db.com/download/34335/
titleVMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution
typeremote

Metasploit

descriptionVMTurbo Operations Manager 4.6 and prior are vulnerable to unauthenticated OS Command injection in the web interface. Use reverse payloads for the most reliable results. Since it is a blind OS command injection vulnerability, there is no output for the executed command when using the cmd generic payload. Port binding payloads are disregarded due to the restrictive firewall settings. This module has been tested successfully on VMTurbo Operations Manager versions 4.5 and 4.6.
idMSF:EXPLOIT/UNIX/HTTP/VMTURBO_VMTADMIN_EXEC_NOAUTH
last seen2020-06-07
modified2017-07-24
published2014-08-11
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/http/vmturbo_vmtadmin_exec_noauth.rb
titleVMTurbo Operations Manager vmtadmin.cgi Remote Command Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/127864/vmturbo_vmtadmin_exec_noauth.rb.txt
idPACKETSTORM:127864
last seen2016-12-05
published2014-08-14
reporterEmilio Pinna
sourcehttps://packetstormsecurity.com/files/127864/VMTurbo-Operations-Manager-4.6-vmtadmin.cgi-Remote-Command-Execution.html
titleVMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution