Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/windows/misc/solarwinds_amqp_deserialization.md
Views: 11789
Vulnerable Application
The SolarWinds Information Service (SWIS) is vulnerable to RCE by way of a crafted message received through the AMQP message queue. A malicious user that can authenticate to the AMQP service can publish such a crafted message whose body is a serialized .NET object which can lead to OS command execution as NT AUTHORITY\SYSTEM.
Verification Steps
Install the application (tested SolarWindows Orion NPM versions 2020.2.5 and 2020.2.6)
After installation is complete, create an AMQP account so you know the credentials. The default account is
orion
.Open a command prompt in
C:\Program Files (x86)\SolarWinds\Orion\RabbitMQ\sbin>
Run:
.\rabbitmqctl.bat add_user "hax" "Password1!"
Run:
.\rabbitmqctl.bat set_permissions hax .* .* .*
Run:
.\rabbitmqctl.bat set_user_tags hax administrator
Start msfconsole
Do:
use exploit/windows/misc/solarwinds_amqp_deserialization
Set the
RHOSTS
,USERNAME
,PASSWORD
,PAYLOAD
and payload related-optionsDo:
run
You should get a shell.