Skip to content

Latest commit

 

History

History
43 lines (29 loc) · 1.94 KB

README.md

File metadata and controls

43 lines (29 loc) · 1.94 KB

BMC Bladelogic RSCD remote exploits for Linux and Windows

Change passwords, List users and Remote code execution

Exploiting vulnerabilities in BMC BladeLogic RSCD agent

  • CVE-2016-1542 (BMC-2015-0010)
  • CVE-2016-1543 (BMC-2015-0011)
  • CVE-2016-5063

Published on exploit-db

BMC_rexec.py Overview

This method of remote execution was achieved by doing my own research - it is performed using XMLRPC and has only been tested against Windows. The script will hang, but the command should execute.

rexec poc

Nick Bloor has a much better execution exploit using a different technique:

BMC_winUsers.py Overview

After some research I was able to pull Windows users from the Windows BMC agent over XML RPC, so I adapted the getUsers file from ernw/insinuator to make a Windows version (see the following screenshot). I also modified the ernw/insinuator version to make it a dual platform exploit.

winUsers poc

Credits

My exploits are adapted from https://github.com/ernw/insinuator-snippets/tree/master/bmc_bladelogic

Thanks to Nick Bloor for AWS image for testing.

Vendor links