Skip to content

Commit 79cac47

Browse files
author
Pedro Ribeiro
committed
add suggestions by cdelafuente-r7
1 parent 33edfaa commit 79cac47

File tree

1 file changed

+17
-8
lines changed

1 file changed

+17
-8
lines changed

documentation/modules/exploit/multi/http/microfocus_obm_auth_rce.md

+17-8
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,25 @@
11
## Vulnerable Application
22

3-
This module exploits an authenticated Java deserialization that affects a truckload of Micro Focus products:
3+
This module exploits an authenticated Java deserialization that affects a truckload of Micro Focus products:
44
* Operations Bridge Manager versions: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions
55
* Application Performance Management versions: 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3
6-
* Data Center Automation version 2019.11
7-
* Operations Bridge (containerized) versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11
8-
* Universal CMDB versions: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30
9-
* Hybrid Cloud Management version 2020.05
6+
* Data Center Automation version 2019.11
7+
* Operations Bridge (containerized) versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11
8+
* Universal CMDB versions: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30
9+
* Hybrid Cloud Management version 2020.05
1010
* Service Management Automation versions 2020.5 and 2020.02
1111

1212
Exploiting this vulnerability will result in remote code execution as the root user on Linux or the SYSTEM user on Windows.
13-
Authentication is required, the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY, which should be fed to the module.
13+
Authentication is required, the module user needs to login to the application and obtain the authenticated LWSSO_COOKIE_KEY,
14+
which should be fed to the module.
1415
Any authenticated user can exploit this vulnerability, even the lowest privileged ones.
1516

16-
The exploit uses a modified ysoserial c3p0 payload. The only part that is modified is that c3p0 is built using version 0.9.1.2, so that the serialVersionUid of the target is the same as the exploit. This can be achieved by patching ysoserial's pom.xml.
17+
The exploit uses a modified ysoserial c3p0 payload. The only part that is modified is that c3p0 is built using version 0.9.1.2,
18+
so that the serialVersionUid of the target is the same as the exploit. This can be achieved by patching ysoserial's pom.xml.
1719

18-
This module was only tested with Operations Bridge Manager 2020.05 and 2019.11. It should work as is with earlier Operations Bridge Manager versions, but it might require small modifications (to the cookie name or vulnerable URI) for the other affected products. However it is equally likely that it works out of the box with the other products, as HPE / Micro Focus is well known for re-using (vulnerable) code.
20+
This module was only tested with Operations Bridge Manager 2020.05 and 2019.11. It should work as is with earlier Operations Bridge Manager
21+
versions, but it might require small modifications (to the cookie name or vulnerable URI) for the other affected products. However it is
22+
equally likely that it works out of the box with the other products, as HPE / Micro Focus is well known for re-using (vulnerable) code.
1923

2024
For more information refer to the advisory link:
2125
* https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBM.md
@@ -38,6 +42,11 @@ Vulnerable versions of the software can be downloaded from Micro Focus website b
3842
8. `run`
3943
9. You should get a shell.
4044

45+
## Options
46+
`LWSSO_COOKIE_KEY` is a required option that must be set by the user. This cookie is returned when a user authenticates to OBM using the
47+
web interface.
48+
Paste the cookie contents into this variable so that the module can perform the authenticated exploit.
49+
4150
## Scenarios
4251

4352
```

0 commit comments

Comments
 (0)