Advisory #: 84
Title: Oracle Exadata InfiniBand Vulnerabilities
Author: Larry W. Cashdollar, @_larry0
Date: 2012-03-14
CVE-ID:[CVE-none]
CWE:
Download Site: http://www.oracle.com/us/products/database/exadata/overview/index.html
Vendor: Oracle Systems
Vendor Notified: 2012-03-14
Vendor Contact: bugtraq
Advisory: http://www.vapid.dhs.org/advisories/oracle_exadata_default_passwd.html
Description: Oracle Exadata is the only database machine that provides extreme performance for both data warehousing and OLTP applications, making it the ideal platform for consolidating on private clouds. It is a complete package of servers, storage, networking, and software that is massively scalable, secure, and redundant. With Oracle Exadata customers can reduce IT costs through consolidation, store up to ten times more data, improve performance of all applications, deliver a faster time-to-market by eliminating systems integration trial and error, and make better business decisions in real time.
Vulnerability:
The oracle engineered solution contains two leaf switches and in larger installations a spine switch. The installation I worked with didn't have a spine switch, but the two leaf switches were configured with three logins with easily guessable passwords and a shadow file that was world readable. There are three accounts with easily guessable default passwords on the exadata inifiniband switches: ilom-admin,ilom-operator and nm2user. rux0r:~ meep0$ ssh ilom-admin@192.168.0.113 "cat /conf/shadow" The shadow file is world readable: [root@exad-1swib2 ~]# ls -l /conf/shadow -rw-r--r-- 1 root root 749 Dec 23 2011 /conf/shadow Vendor: notified 3/12/2012
Export: JSON TEXT XML
Exploit Code:
  1.  
Screen Shots:
Notes:
86621 86620