National Cyber Warfare Foundation (NCWF) Forums


Metasploit Weekly Wrap-Up 04 26 24


0 user ratings
2024-04-26 19:56:17
milo
Red Team (CNA)

Rancher Modules


This week, Metasploit community member h00die added the second of two modules targeting Rancher instances. These modules each leak sensitive information from vulnerable instances of the application which is intended to manage Kubernetes clusters. These are a great addition to Metasploit’s coverage for testing Kubernetes environments.


PAN-OS



Rancher Modules


Metasploit Weekly Wrap-Up 04/26/24

This week, Metasploit community member h00die added the second of two modules targeting Rancher instances. These modules each leak sensitive information from vulnerable instances of the application which is intended to manage Kubernetes clusters. These are a great addition to Metasploit’s coverage for testing Kubernetes environments.


PAN-OS RCE


Metasploit also released an exploit for the unauthenticated RCE in PAN-OS that has been receiving a lot of attention recently. This vulnerability is an unauthenticated file creation that can be leveraged to trigger the execution of remote commands. See Rapid7’s analysis on AttackerKB for an in depth explanation of the root cause.


New module content (8)


Rancher Authenticated API Credential Exposure


Authors: Florian Struck, Marco Stuurman, and h00die

Type: Auxiliary

Pull request: #18956 contributed by h00die

Path: gather/rancher_authenticated_api_cred_exposure

AttackerKB reference: CVE-2021-36782


Description: This adds an exploit for CVE-2021-36782, a vulnerability which can be leveraged by an authenticated attacker to leak API credentials from an affected Rancher instance.


Gitlab Version Scanner


Author: Julien (jvoisin) Voisin

Type: Auxiliary

Pull request: #18723 contributed by jvoisin

Path: scanner/http/gitlab_version


Description: A web page exists that can be reached without authentication that contains a hash that can be used to determine the approximate version of gitlab running on the endpoint. This PR enhances our current GitLab fingerprinting capabilities to include the aforementioned technique.


Apache Solr Backup/Restore APIs RCE


Authors: jheysel-r7 and l3yx

Type: Exploit

Pull request: #19046 contributed by jheysel-r7

Path: linux/http/apache_solr_backup_restore

AttackerKB reference: CVE-2023-50386


Description: Adds apache_solr_backup_restore module, taking advantage of a Unrestricted Upload of File with Dangerous Type vulnerability, allowing the user to gain a session in an Apache Solr instance for remote code execution.


Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution


Authors: remmons-r7 and sfewer-r7

Type: Exploit

Pull request: #19101 contributed by remmons-r7

Path: linux/http/panos_telemetry_cmd_exec

AttackerKB reference: CVE-2024-3400


Description: This adds an exploit module for https://security.paloaltonetworks.com/CVE-2024-3400, affecting PAN-OS GlobalProtect Gateway and GlobalProtect Portal deployments with the default telemetry service enabled.


GitLens Git Local Configuration Exec


Authors: Paul Gerste and h00die

Type: Exploit

Pull request: #18997 contributed by h00die

Path: multi/fileformat/gitlens_local_config_exec

AttackerKB reference: CVE-2023-46944


Description: This adds a FileFormat exploit for VSCode. The VSCode extension GitLens by GitKraken before v.14.0.0 allows an untrusted workspace to execute git commands. A repo may include its own .git folder including a malicious config file to execute arbitrary code.


Code Reviewer


Author: h00die

Type: Exploit

Pull request: #18996 contributed by h00die

Path: multi/fileformat/visual_studio_vsix_exec


Description: This adds a new exploit module that creates a malicious VS / VSCode extension file.


Gambio Online Webshop unauthenticated PHP Deserialization Vulnerability


Authors: h00die-gr3y [email protected] and usd Herolab

Type: Exploit

Pull request: #19005 contributed by h00die-gr3y

Path: multi/http/gambio_unauth_rce_cve_2024_23759

AttackerKB reference: CVE-2024-23759


Description: This adds a module for a Remote Code Execution vulnerability in Gambio Online Webshop version 4.9.2.0 and lower allows remote attackers to run arbitrary commands via unauthenticated HTTP POST request.


FortiNet FortiClient Endpoint Management Server FCTID SQLi to RCE


Authors: James Horseman, Spencer McIntyre, Zach Hanley, and jheysel-r7

Type: Exploit

Pull request: #19082 contributed by jheysel-r7

Path: windows/http/forticlient_ems_fctid_sqli

AttackerKB reference: CVE-2023-48788


Description: Adds windows/http/forticlient_ems_fctid_sqli module that takes advantage of a SQLi injection vulnerability in FortiNet FortiClient EMS.


Enhancements and features (11)



  • #17294 from adfoster-r7 - This adds a new EVENT_DEPENDENT value for module reliability metadata.

  • #18723 from jvoisin - A web page exists that can be reached without authentication that contains a hash that can be used to determine the approximate version of gitlab running on the endpoint. This PR enhances our current GitLab fingerprinting capabilities to include the aforementioned technique.

  • #18914 from dotslashsuperstar - This PR adds functionality so that CVE and URL references will be imported from an OpenVAS XML report by default. DNF-CERT and CERT-BUND references can also be collected by sending additional flags to the db_import command.

  • #19054 from zgoldman-r7 - Adds NText column parsing to MSSQL modules.

  • #19066 from sjanusz-r7 - Adds automated tests for multiple SMB modules.

  • #19078 from dwelch-r7 - Fixes a crash in the modules/auxiliary/gather/ldap_query.rb module when running queries from a file.

  • #19080 from cgranleese-r7 - Adds architecture and platform detection for PostgreSQL sessions.

  • #19086 from nrathaus - Update Metasploit's RPC to expose module's default_options metadata.

  • #19105 from zgoldman-r7 - Not written.

  • #19112 from zgoldman-r7 - Adds architecture and platform detection for MSSQL sessions.

  • #19122 from h00die - Adds additional reliability metadata to exploits/linux/local/vcenter_java_wrapper_vmon_priv_esc.


Bugs fixed (6)



  • #19079 from nrathaus - Fixes an issue were the password_spray module option was being ignored.

  • #19089 from adfoster-r7 - This PR fixes a bug where a user might get an unexpected NoMethodError running the linux/local/exim4_deliver_message_priv_esc module.

  • #19111 from zeroSteiner - This PR fixes a bug where a user can specify an invalid payload architecture for a given exploit target. Previously, it was not possible to tab-complete an invalid payload, but this enforces the architecture limitations with a run-time exception before sending the exploit.

  • #19113 from adfoster-r7 - Fixes a regression that caused Metasploit to leak memory, and sometimes crash.

  • #19114 from zeroSteiner - This PR fixes several instances where we we pass nil values rather than the types expected, causing crashes and stack traces in LDAP-related modules.

  • #19129 from nrathaus - This fixes a bug where the notes command included an example which contained a flag that was not supported.


Documentation added (1)



  • #19088 from adfoster-r7 - This PR adds documentation for running and writing Metasploit's unit tests.


You can always find more documentation on our docsite at docs.metasploit.com.


Get it


As always, you can update to the latest Metasploit Framework with msfupdate

and you can get more details on the changes since the last blog post from

GitHub:



If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest.

To install fresh without using git, you can use the open-source-only Nightly Installers or the

commercial edition Metasploit Pro




Source: Rapid7
Source Link: https://blog.rapid7.com/2024/04/26/metasploit-weekly-wrap-up-04-26-24/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



© Copyright 2012 through 2024 - National Cyber War Foundation - All rights reserved worldwide.