Marvell QConvergeConsole Path Traversal (CVE-2025-6793) Module#21322
Conversation
Marvell QConvergeConsole Path Traversal (CVE-2025-6793)
|
Hello @h4x-x0r ! i have set up the target and i am going to test it soon, also i'll try to investigate the two open questions: |
| strong_name = res.body.match(/Sb='([A-Fa-f0-9]{32})'/)&.captures&.first | ||
| strong_name ||= res.body.match(/([A-Fa-f0-9]{32})\.cache\.html/)&.captures&.first | ||
|
|
||
| return Exploit::CheckCode::Unknown('Could not determine GWT strong name') unless strong_name |
|
@dledda-r7 Were you able to replicate the module in your test environment? Do you have any feedback that I can address before the module can get merged? |
dledda-r7
left a comment
There was a problem hiding this comment.
msf auxiliary(gather/qconvergeconsole_traversal) > run
[*] Running module against 10.5.135.134
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Vulnerable version detected: 5.0.78
[+] File retrieved: C:\Windows/win.ini
[*] File saved as loot: /home/kali/.msf4/loot/20260508114551_default_10.5.135.134_qconvergeconsole_548615.ini
[*] Auxiliary module execution completed
msf auxiliary(gather/qconvergeconsole_traversal) >
Hello @h4x-x0r I think we are good :) |
dledda-r7
left a comment
There was a problem hiding this comment.
just the check method. let me know if it makes sense to you
|
@dledda-r7 Sorry I wasn't able to get back to you earlier. I saw you already merged it, thank you! |
This module exploits a path traversal vulnerability (CVE-2025-6793) in Marvell QConvergeConsole <= v5.5.0.85 to read arbitrary files from the system. No authentication is required to exploit this issue.
Note that whatever file is retrieved will be deleted from the server it was fetched from.
Verification Steps
msfconsoleuse auxiliary/gather/qconvergeconsole_traversalset RHOSTS <IP>runExample output:
Successfully tested on