-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add java target for ManageEngine ServiceDesk Plus CVE-2022-47966 #18515
Conversation
modules/exploits/multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966.rb
Outdated
Show resolved
Hide resolved
@bwatters-r7 any updates? |
Sorry; I was out for a bit on holiday. I grabbed this because I thought I could knock it out quickly, but my test install's SAML expired, so I need to go back and remember how to get that going. I have not forgotten about this. |
Check out the documentation for the module that I've linked with the PR, it doesn't need you to have a active SAML. |
|
Release NotesThis PR adds a java target for the manageengine servicedesk plus exploit CVE-2022-47966 using the payload mentioned in this blogpost and deletes the log file that records the error due to the exploit to make it more stealthy. |
Partially fixes: #17641
In this PR, I've added a java target for the manageengine servicedesk plus exploit(CVE-2022-47966) using the payload mentioned in this blogpost to make it more stealthy. It invokes javascript's javascript engine to execute arbitary java. I've used the URLClassLoader class to load a remote payload hosted by metasploit and bypass the Suricata rule mentioned in the blogpost. The exploit uses
java/shell_reverse_tcp
as its payload since other payloads fail to work. Custom java payloads can be used to execute a particular function to bypass the Sigma rule. Before running the exploit, it deletes the log file that records the error due to the exploit in an attempt to bypass Velociraptor's detection.Example Usage - ServiceDesk Plus version 14003 on kali linux - Target 0 ('java')
Link to setup vulnerable software here
Once changes for this module are finalized, I'll make the corresponding changes for the other two modules using the same exploit