Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TeamViewer URI SMB exploit (CVE-2020-13699) #13989

Merged
merged 4 commits into from
Aug 19, 2020
Merged

Conversation

h00die
Copy link
Contributor

@h00die h00die commented Aug 13, 2020

This adds an HTTP server which responds to Firefox (all other browsers aren't exploitable) with an iframe that will force TeamViewer to create an SMB connection to a server of our choice. Exploits CVE-2020-13699. This is an unbelievably simple exploit.
I can provide the Teamviewer 15.4.4445 installer binary if needed.

Verification

  • Install the application
  • Start msfconsole
  • Do: use auxiliary/server/teamviewer_uri_smb_redirect
  • Do: set SMB_SERVER [IP]
  • Do: run
  • Start an SMB Capture or Relay server (such as responder)
  • Open the URL on the target
  • The SMB Server should receive a connection.

@jeffssh FYI.

I also wanted to note I emailed @jeffssh about this exploit with a question. They answered back immediately and were super nice answering my questions, so just wanted to say thanks and show appreciation!

@cdelafuente-r7 cdelafuente-r7 self-assigned this Aug 17, 2020
Copy link
Contributor

@cdelafuente-r7 cdelafuente-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @h00die for this module. I just left a couple of small comments related to typos in the documentation.

@cdelafuente-r7
Copy link
Contributor

This has been tested against Teamviewer v8.0.16642 and v15.4.4445. Both versions connect to the controlled SMB server as expected.

@h00die
Copy link
Contributor Author

h00die commented Aug 18, 2020

all done, added 8.0.16642 to the list of confirmed versions as well.

@cdelafuente-r7
Copy link
Contributor

Thank you! I'll go ahead and land it shortly.

@cdelafuente-r7 cdelafuente-r7 merged commit f05f2b1 into rapid7:master Aug 19, 2020
@cdelafuente-r7
Copy link
Contributor

cdelafuente-r7 commented Aug 19, 2020

Original Release Notes
This adds an exploit targeting an unquoted parameter call within the Teamviewer URI handler to create an SMB connection to an attacker controlled IP. This vulnerability is identified as CVE-2020-13699. By successfully exploiting this, an attacker would be able to capture the NTLM authentication contained in the request to retrieve passwords (hash cracking) or relay it (using a tool like responder) for code execution.

@h00die h00die deleted the tv_smb branch August 19, 2020 11:10
@adfoster-r7 adfoster-r7 added the rn-modules release notes for new or majorly enhanced modules label Aug 24, 2020
@pbarry-r7
Copy link
Contributor

Release Notes

New module auxiliary/server/teamviewer_uri_smb_redirect targets remote desktop software TeamViewer Desktop for Windows, creating an SMB connection with a vulnerable target via an unquoted parameter call within the
TeamViewer URI handler (CVE-2020-13699).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs module rn-modules release notes for new or majorly enhanced modules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants