Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create exploit for CVE-2020-11858 / Micro Focus Operations Bridge Manager Local Privilege Escalation #14730

Merged
merged 4 commits into from
Feb 15, 2021

Conversation

pedrib
Copy link
Contributor

@pedrib pedrib commented Feb 9, 2021

This creates a local Windows exploit for CVE-2020-11858. See details at:
https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md (vulnerability 7).

It allows an unpriviliged user (such as Guest) to escalate privileges to SYSTEM.

  1. Install the application
  2. Start msfconsole
  3. use exploit/windows/local/microfocus_operations_privesc.rb
  4. set session SESSION
  5. set lhost YOUR_IP
  6. run
  7. You should get a shell.

pcap's available on request!

@agalway-r7
Copy link
Contributor

Hey @pedrib, would you be able to either send PCAPs for this PR to the msfdev email or run a demo for this module? I'm not able to get a vulnerable version of OBM without forking out for a Micro Focus Licence

@pedrib
Copy link
Contributor Author

pedrib commented Feb 12, 2021

@agalauner-r7 I have sent it to msfdev@metasploit.com, with subject "Captures for PR #14730"

Let me know if you need anything else!

@agalway-r7 agalway-r7 merged commit f227e82 into rapid7:master Feb 15, 2021
@agalway-r7
Copy link
Contributor

agalway-r7 commented Feb 15, 2021

PCAP wasn't that useful for checking if the module worked as expected due to the exploit being local, but based on other modules landed by pedrib for OBM and my being able to get the payload written to a victim machine correctly, I'd say this is good to go in 👍

@agalway-r7
Copy link
Contributor

agalway-r7 commented Feb 15, 2021

Release Notes

New module exploits/windows/local/microfocus_operations_privesc achieves privilege escalation assuming target is running a vulnerable version of OBM and user already has a session on said machine which supports Powershell. This module writes a payload to specific folder, then sends request to OBM process via the loopback address to trigger payload execution.

@agalway-r7 agalway-r7 added the rn-modules release notes for new or majorly enhanced modules label Feb 15, 2021
@pedrib
Copy link
Contributor Author

pedrib commented Feb 16, 2021

awesome, thank you!

@pedrib pedrib deleted the obm_local branch February 16, 2021 13:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
docs module rn-modules release notes for new or majorly enhanced modules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants