|
| 1 | +# Exploit Title: ManageEngine ADManager Plus Build < 7210 Elevation of |
| 2 | +Privilege Vulnerability |
| 3 | +# Exploit Author: Metin Yunus Kandemir |
| 4 | +# Vendor Homepage: https://www.manageengine.com/ |
| 5 | +# Software Link: https://www.manageengine.com/products/ad-manager/ |
| 6 | +# Details: https://docs.unsafe-inline.com/0day/admanager-plus-build-less-than-7210-elevation-of-privilege-vulnerability-cve-2024-24409 |
| 7 | +# Version: ADManager Plus Build < 7210 |
| 8 | +# Tested against: Build 7203 |
| 9 | +# CVE: CVE-2024-24409 |
| 10 | + |
| 11 | + |
| 12 | +# Description |
| 13 | +The Modify Computers is a predefined role in ADManager for managing |
| 14 | +computers. If a technician user has the Modify Computers privilege |
| 15 | +over a computer can change the userAccountControl and |
| 16 | +msDS-AllowedToDelegateTo attributes of the computer object. In this |
| 17 | +way, the technician user can set Constrained Kerberos Delegation over |
| 18 | +any computer within the Organizational Unit that the user was |
| 19 | +delegated. |
| 20 | + |
| 21 | +Contrary to what ADManager claims the user who has the Modify |
| 22 | +Computers role can change the privilege of computer objects in the |
| 23 | +Active Directory. The Constrained Kerberos Delegation can be set for |
| 24 | +any service such as CIFS, LDAP, HOST services. Then the user can |
| 25 | +access these services by abusing the Constrained Kerberos Delegation. |
| 26 | +In addition, the Unconstrained Kerberos Delegation can be set over the |
| 27 | +computer objects by changing the userAccountControl attribute. |
| 28 | +Normally, only users that have SeEnableDelegationPrivilege privilege |
| 29 | +can set constrained kerberos delegation. Only members of the |
| 30 | +BUILTIN\Administrators group have this privilege by default. The |
| 31 | +delegated user for an Organizational Unit can not set constrained |
| 32 | +kerberos delegation even if a user has the GenericAll right over a |
| 33 | +computer account, so the delegation process in Active Directory does |
| 34 | +not grant this privilege. However, the technician user can use the |
| 35 | +SeEnableDelegationPrivilege right via the Modify Computers role. |
| 36 | + |
| 37 | +# Vulnerability reasons |
| 38 | +1. ADMP Web App Authorization issue: Assigning a predefined Modify |
| 39 | +Computers role delegates the technician user to modify custom |
| 40 | +attributes of computers unexpectedly. Even though it appears that this |
| 41 | +privilege is not granted in the UI, the Additional Custom Attribute |
| 42 | +property is assigned and this leads to broken access control |
| 43 | +vulnerability. |
| 44 | + |
| 45 | +2. There is no restriction for editing the userAccountControl and |
| 46 | +msDS-AllowedToDelegateTo attributes of the computer objects. The ADMP |
| 47 | +application performs changes with domain admin privileges as designed |
| 48 | +so that if we can bypass some restrictions (e.g. format of attribute |
| 49 | +value), our requests are applied with domain admin privileges. This |
| 50 | +way we can edit the attributes userAccountControl and |
| 51 | +msDS-AllowedToDelegateTo. |
| 52 | + |
| 53 | +# Impact |
| 54 | +A technician user elevates privileges from Domain User to Domain |
| 55 | +Admin. For example, the user can set Constrained Kerberos Delegation |
| 56 | +over CLIENT1$ for the CIFS service of the domain controller and access |
| 57 | +the CIFS service. As a result, the user is delegated to manage |
| 58 | +CLIENT1$ but he can access the CIFS service of the domain controller |
| 59 | +impersonating a user unexpectedly. |
| 60 | + |
| 61 | +# Proof Of Concept |
| 62 | +https://docs.unsafe-inline.com/0day/admanager-plus-build-less-than-7210-elevation-of-privilege-vulnerability-cve-2024-24409 |
0 commit comments