Rapid7 Vulnerability & Exploit Database

Nuuo Central Management Authenticated SQL Server SQLi

Back to Search

Nuuo Central Management Authenticated SQL Server SQLi

Disclosed
10/11/2018
Created
03/19/2019

Description

The Nuuo Central Management Server allows an authenticated user to query the state of the alarms. This functionality can be abused to inject SQL into the query. As SQL Server 2005 Express is installed by default, xp_cmdshell can be enabled and abused to achieve code execution. This module will either use a provided session number (which can be guessed with an auxiliary module) or attempt to login using a provided username and password - it will also try the default credentials if nothing is provided.

Author(s)

  • Pedro Ribeiro <pedrib@gmail.com>

Platform

Windows

Architectures

x86

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/windows/nuuo/nuuo_cms_sqli
msf exploit(nuuo_cms_sqli) > show targets
    ...targets...
msf exploit(nuuo_cms_sqli) > set TARGET < target-id >
msf exploit(nuuo_cms_sqli) > show options
    ...show and set options...
msf exploit(nuuo_cms_sqli) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;