Skip to content

Commit

Permalink
markdown issue
Browse files Browse the repository at this point in the history
  • Loading branch information
SpenGietz committed Jan 26, 2019
1 parent 96ef6fa commit de82517
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions CVE-2018-5757/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,13 +13,13 @@ The "Ping" and "Traceroute" functions in the AudioCodes 450HD web UI place user-

### Usage/Exploitation
- First login to the web UI of the device. There is a default administrator user using "admin" as the password and "1234" as the password.
- When making a request to the "Traceroute" function of the web UI, something similar to the following request is made:
- When making a request to the "Traceroute" function of the web UI, something similar to the following request is made:
![Normal traceroute request](legit_request.jpg)
- By modifying the query string of the URL, it is possible to inject arbitrary commands to run on the operating system. The payload that was confirmed working looked like this:
```
traceroute 127.0.0.1|<YOUR COMMAND>|a #'
```
Here is an example screenshot that runs "ls /" on the operating system.
Here is an example screenshot that runs "ls /" on the operating system.
![Listing the contents of the "/" folder on the phone](exploit_request.png)
- The following screenshot shows the output of the previous command, which shows that localhost was tracerouted and then a listing of the "/" folder follows.
![The output of the code we executed on the system](exploit_response.png)
- The following screenshot shows the output of the previous command, which shows that localhost was tracerouted and then a listing of the "/" folder follows.
![The output of the code we executed on the system](exploit_response.jpg)

0 comments on commit de82517

Please sign in to comment.