Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/unix/sonicwall/sonicwall_xmlrpc_rce.md
Views: 11789
Vulnerable Application
sonicwall_xmlrpc_rce is a remote exploit against SonicWall Global Management System Virtual Appliance and is written by Michael Flanders of Trend Micro Zero Day Initiative with assistance by @kernelsmith of Trend Micro Zero Day Initiative. It is considered a reliable exploit, and allows you to remotely execute commands as root.
This exploit works against a vulnerable SonicWall Global Management System Virtual Appliance (A.K.A. Sonicwall GMSVP) of versions 8.1 (Build 8110.1197) and earlier. The virtual appliance can be downloaded here:
This module exploits the virtual appliance's lack of checking on user-supplied parameters to XML-RPC calls to a vulnerable Java service running on port 21009. A call to a shell script is made using this user-supplied parameter contained in backticks allowing command substitution and remote code execution.
To reliably determine whether the target virtual appliance is vulnerable, you will have to examine the web console's login page. This is also automatically done in the check function of the exploit.
Verification Steps
Start
msfconsole
use exploit/unix/sonicwall/sonicwall_xmlrpc_rce
set RHOST
to the IP address of the vulnerable virtual applianceset RPORT
to 21009set payload
to the desired payloadset any additional options for the payload e.g. LHOST/LPORT
exploit
Verify that you get a shell
Verify that you do not crash
Options
Set this true/false depending on whether the instance of SonicWall GMSVP has been configured to use SSL.
This is the port of the login page for the web server/virtual appliance. For SonicWall GMVSP this is typically http://[ip]:80; therefore, this option is set by default to 80 (or 443 if
set SSL true
).
Scenarios
This is example output from a normal usage/scenario. This console output is for SonicWall GMSVP version 8.0 (Build 8046.1396):