[17381] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Advisory def-2000-02: Cisco Catalyst remote command execution

daemon@ATHENA.MIT.EDU (Andrew Frith)
Thu Oct 26 21:32:12 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Disposition: inline
Message-ID:  <s9f86b6c.001@gateway.bm>
Date:         Thu, 26 Oct 2000 17:35:10 -0300
Reply-To: Andrew Frith <AndrewF@GATEWAY.BM>
From: Andrew Frith <AndrewF@GATEWAY.BM>
X-To:         Olle.Segerdahl@DEFCOM-SEC.COM
To: BUGTRAQ@SECURITYFOCUS.COM
Content-Transfer-Encoding: 8bit

I was unable to reproduce this on a 2924-XL running version 11.2(8.2)SA6.  Entering that URL in a web browser prompts for a password.  It will only execute once the enable password has been entered.

>>> Olle Segerdahl <Olle.Segerdahl@DEFCOM-SEC.COM> 10/26/00 05:51AM >>>
----------------------=[Detailed Description]=------------------------
Cisco Catalyst 3500 XL series switches have a webserver configuration
interface. This interface lets any anonymous web user execute any
command without supplying any authentication credentials by simply
requesting the /exec location from the webserver. An example follows:
http://catalyst/exec/show/config/cr 
This URL will show the configuration file, with all user passwords.

home help back first fref pref prev next nref lref last post