ArcGIS Server 10.3.1 RMIClassLoader useCodebaseOnly Code Execution

2017.10.11
Credit: Harrison Neal
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

Using an Esri-provided image on Azure's Marketplace, ArcGIS Server 10.3.1 started Java's rmid on port 1098 and explicitly set the property java.rmi.server.useCodebaseOnly equal to false. Screenshot: https://www.dropbox.com/s/xz9ugal3ixnfh1c/10.3.1_rmid_useCodebaseOnly%3Dfalse.png?dl=0 As discussed on Oracle's website, the default value of java.rmi.server.useCodebaseOnly was changed to true in Java 7 Update 21, with a remark that setting it to false could create a risk of RCE. Link: http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html While the version of Java included in ArcGIS Server 10.3.1 appears to be Java 7 Update 76, which would have the more secure default setting, that is irrelevant due to the ArcGIS solution manually changing it. Screenshot: https://www.dropbox.com/s/5reh81dwwp9e4dz/10.3.1_rmid_java7u76.png?dl=0 When an attacker can remotely reach rmid on the victim server, and the victim server can reach a web server on a machine controlled by the attacker, this is relatively easily exploited to gain RCE. Video: https://www.dropbox.com/s/t4fmxwzjzzo7yhe/ArcGIS_useCodebaseOnly%3Dfalse_exploitation.wmv?dl=0 Administrators are encouraged to use a tool such as Process Explorer or wmic to ensure that the command line arguments passed to rmid have the java.rmi.server.useCodebaseOnly property equal to true. During testing, Esri-provided images on Azure's Marketplace for ArcGIS Server 10.4.1 and 10.5.1 were found to set that property to true; administrators may try updating to a newer version of ArcGIS Server, and/or contacting Esri for assistance. If an update is required but not immediately possible, consider firewall rules to block access to rmid from systems that have no need to connect to it. ------- Supplemental informatio: After playing with this for a few more hours, it turns out that you don't need the victim to be able to reach an attacker-controlled web server if you can take advantage of gadgets already present on the victim server. For example, on the Azure Marketplace image for ArcGIS Server 10.3.1, there are copies of several out-of-date libraries that the ysoserial project targets. Link: https://github.com/frohoff/ysoserial You'll want to add lines similar to the following to the beginning of the main method of ysoserial.exploit.RMIRegistryExploit, and then recompile: System.setProperty("java.rmi.server.codebase", "file:///C:/ArcGIS/Server/geronimo/repository/commons-collections/commons-collections/3.2/commons-collections-3.2.jar"); System.setProperty("java.rmi.server.useCodebaseOnly", "false"); This will have ysoserial suggest to rmid on the victim server where it can load vulnerable copies of the Apache Commons Collections classes from. Then, you simply exploit the remote server with something like: java.exe -cp ysoserial-0.0.6-SNAPSHOT-all.jar ysoserial.exploit.RMIRegistryExploit 10.x.y.z 1098 CommonsCollections1 calc And you should notice calc running as a child process of rmid on the victim server, without having required the victim server contact some other web server. That said, this is based on the image in Azure Marketplace; your mileage on other systems may vary.

References:

https://www.dropbox.com/s/xz9ugal3ixnfh1c/10.3.1_rmid_useCodebaseOnly%3Dfalse.png?dl=0
http://docs.oracle.com/javase/7/docs/technotes/guides/rmi/enhancements-7.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top