how to hack vmware vcenter server in 60 seconds

17
How to hack VMware vCenter server in 60 seconds Alexey Sintsov Alexander Minozhenko

Upload: positive-hack-days

Post on 20-Aug-2015

7.854 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: How to hack VMware vCenter server in 60 seconds

How to hack VMware

vCenter server in

60 secondsAlexey Sintsov

Alexander Minozhenko

Page 2: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

@asintsov @al3xmin

Hijacking VMware

• Pen-testers at Digital Security

• Researchers

• DCG#7812 / Zeronights

• FUN, FUN, FUN

Page 3: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

Our target

Hijacking VMware

Page 4: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

VMware vCenter Server

Hijacking VMware

• VMware vCenter Server is solution to manage VMware vSphere

• vSphere – virtualization operating system

Page 5: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

Pen-test…

Hijacking VMware

• Vmware vCenter version 4.1 update 1

Services:• Update Manager• vCenter Orchestrator• Chargeback• Other

• Most of those services has web server

Page 6: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

VASTO and CVE-2009-1523

Hijacking VMware

• Directory traversal in Jetty web server http://target:9084/vci/download/health.xml/%3f/../../../../FILE• Discovered by Claudio Criscione

• Fixed in VMware Update Manager 4.1 update 1 :(

• Who want to pay me for 0day?• Pentester is not resercher?

Page 7: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

8(

Hijacking VMware

Page 8: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

CVE-2010-1870

Hijacking VMware

• VMware vCenter Orchestrator use Struts2 version 2.11 discovered by Digital Defense, Inc • CVE-2010-1870 Struts2/XWork remote command execution discovered by Meder Kydyraliev Fixed in 4.2

Page 9: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

Details

Hijacking VMware

•Struts2 does not properly escape “#”

•Could be bypass with unicode “\u0023”

•2 variables need to be set for RCE

•#_memberAccess['allowStaticMethodAccess']

•#context['xwork.MethodAccessor.denyMethodExecution']

Page 10: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

But what about us?

Hijacking VMware

• Directory traversal in Jetty web server … AGAIN!http://target:9084/vci/download/.%5C..%5C..%5C..%5C..%5C..%5C..%5C..%5C..\FILE.EXT

•Metasploit module vmware_update_manager_traversal.rb by sinn3r

• We can read any file! But what

Claudio Criscione propose to read vpxd-profiler-* -/SessionStats/SessionPool/Session/Id='06B90BCB-A0A4-4B9C-B680-FB72656A1DCB'/Username=„FakeDomain\FakeUser'/SoapSession/Id='AD45B176-63F3-4421-BBF0-FE1603E543F4'/Count/total 1

Contains logs of SOAP requests with session ID !!!Discovered by Alexey Sintsov 8)

Sorry, patched in 4.1!

Page 11: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

Attack #1

Hijacking VMware

• Read vpxd-profiler via traversal…• Get Admin’s IP addresses from it…• Read secret SSL key http://target:9084/vci/downloads/.\..\..\..\..\..\..\..\Documents and Settings\All Users\Application Data\VMware\VMware VirtualCenter\SSL\rui.key

• ARP-SPOOF with SSL key - PROFIT

Page 12: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

VMware vCenter Orchestrator

Hijacking VMware

• Vmware vCO – software for automate configuration and management• Install by default with vCenter• Have interesting file

C:\Program files\VMware\Infrastructure\Orchestrator\configuration\jetty\etc\passwd.properties

Page 13: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

VMware vCenter OrchestratorPassword disclosure

Hijacking VMware

Read hash -> crack MD5 -> log on into Orch. -> get vCenter pass

Page 14: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

VMware vCenter Orchestrator – more stuff

Hijacking VMware

• vCO stored password at files:• C:\Program Files\VMware\Infrastructure\Orchestrator\app- server\server\vmo\conf\plugins\VC.xml• C:\Program Files\VMware\Infrastructure\Orchestrator\app-server\server\vmo\conf\vmo.properties

<virtual-infrastructure-host <enabled>true</enabled> <url>https://new-virtual-center-host:443/sdk</url> <administrator-username>vmware</administrator-username> <administrator-password>010506275767b74786b383a4a60be767864740329d5fcf324ec7fc98b1e0aaeef </administrator-password> <pattern>%u</pattern> </virtual-infrastructure-host>

Page 15: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

Hmmm….

Hijacking VMware

006766e7964766a151e213a242665123568256c4031702d4c78454e5b575f60654b

vmware 00776646771786a783922145215445b62322d1a2b5d6e196a6a712d712e24726079

vcenter

• Red bytes look like length

• Green bytes in ASCII range

• Black bytes random Discovered by Alexey Sintsov and Alexander Minozhenko

Page 16: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

0day still not patched 8)

Hijacking VMware

Page 17: How to hack VMware vCenter server in 60 seconds

© 2002—2012, Digital Security

gg and bb

Hijacking VMware

[email protected]

@asintsov

[email protected]

@al3xmin