[17381] in bugtraq
Re: Advisory def-2000-02: Cisco Catalyst remote command execution
daemon@ATHENA.MIT.EDU (Andrew Frith)
Thu Oct 26 21:32:12 2000
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Message-ID: <s9f86b6c.001@gateway.bm>
Date: Thu, 26 Oct 2000 17:35:10 -0300
Reply-To: Andrew Frith <AndrewF@GATEWAY.BM>
From: Andrew Frith <AndrewF@GATEWAY.BM>
X-To: Olle.Segerdahl@DEFCOM-SEC.COM
To: BUGTRAQ@SECURITYFOCUS.COM
Content-Transfer-Encoding: 8bit
I was unable to reproduce this on a 2924-XL running version 11.2(8.2)SA6. Entering that URL in a web browser prompts for a password. It will only execute once the enable password has been entered.
>>> Olle Segerdahl <Olle.Segerdahl@DEFCOM-SEC.COM> 10/26/00 05:51AM >>>
----------------------=[Detailed Description]=------------------------
Cisco Catalyst 3500 XL series switches have a webserver configuration
interface. This interface lets any anonymous web user execute any
command without supplying any authentication credentials by simply
requesting the /exec location from the webserver. An example follows:
http://catalyst/exec/show/config/cr
This URL will show the configuration file, with all user passwords.