High
CVE-2020-7357
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-7357
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Cayin CMS suffers from an authenticated OS semi-blind command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user through the ‘NTP_Server_IP’ HTTP POST parameter in system.cgi page. This issue affects several branches and versions of the CMS application, including CME-SE, CMS-60, CMS-40, CMS-20, and CMS version 8.2, 8.0, and 7.5.
Add Assessment
Ratings
-
Attacker ValueHigh
-
ExploitabilityHigh
Technical Analysis
Cayin CMS systems have an AUTHENTICATED RCE in the NTP configuration. The system didn’t install correctly on Ubuntu 20.04 at the time the exploit was released, and the company recommends Ubuntu 16.04, unknown if 18.04 will work. Grants root on Ubuntu.
Requires creds, default for CMS-SE was administrator:admin, but the original write-up mentions webadmin:bctvadmin.
CMS system can come on hardware devices. CMS-SE the exploitable file is system_service.cgi
however the original vuln write-up mentions system.cgi
, so it looks like there is a variance between the hardware devices and the Ubuntu installer. YMMV.
After authentication, the exploit is against the NTP server IP field. During testing of CMS-SE the Update
button/functionality was used. Clicking save did not have an immediate effect, and Test
worked, but executed 3 times. If your payload is small, you could use Test
, however with a larger payload like meterp, it was determined that the payload was writing 3 times in each stage… So if the payload chunks were A, B, C, the payload ended up AAABBBCCC.
Due to character limit, any payload that isn’t small will need to go through a cmdstager
type chunking. The field can take ~200 characters, believed to be about ~230 but 200 was used in the exploit to allow for padding.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- cayintech
Products
- cms 7.5,
- cms 8.0,
- cms 8.2,
- cms-20 firmware 9.0,
- cms-40 firmware 9.0,
- cms-60 firmware 11.0,
- cms-se firmware 11.0,
- cms-se-lxc firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: