Arista NextGen Firewall Chaining Stored XSS to Root Remote C... #1633
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This post describes a full exploit chain against the Arista Edge Threat Management Next-Generation Firewall (NG Firewall, formerly Untangle), showing how a stored XSS in the web management UI can be chained into authenticated command injection, ultimately yielding root-level RCE on the underlying Debian-based appliance. The NGFW exposes a Java web admin UI (under Apache/Tomcat) as the sole management interface; internally it shells out for diagnostics and reporting. A stored XSS in a configurati...
🔧 Technical Details
Key tricks described:
Stored XSS in high-privilege management UIs for session theft: Find configuration or comment fields that are stored and later rendered without proper output encoding. Inject JavaScript that exfiltrates document.cookie to an attacker-controlled endpoint. Because many appliances do not mark cookies as HttpOnly or bind them to IP/UA, a stolen session cookie can often be replayed to gain full admin access.
Enumerating admin-only endpoints after session hijacking: Once an administrator session is hijacked, systematically explore all authenticated features and hidden APIs (reports, diagnostics, backup/restore). Proxy tools can help discover JSON endpoints and parameters that influence filesystem paths, command arguments, or database queries.
Generic command injection in Java shells using /bin/sh -c: Look for Java code that constructs shell commands with user-influenced strings and executes them via Runtime.exec or ProcessBuilder through /bin/sh -c. If parame...
🤖 Agent Actions
Summary of changes
/bin/sh -c)" subsection tosrc/pentesting-web/command-injection.md, detailing how the Arista NGFW chain abuses a reflected XSS entry point to replay JSON-RPC calls that reach a Java handler spawning/bin/sh -c, plus concrete attack workflow and mitigation guidance.curl -skI https://<target>/capture/handler.py/load_rpc_managerprobe from the Bishop Fox research as a quick way to spot exposed captive-portal handlers before attempting the chain.Testing
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.