Skip to main content

eG Manager v7.1.2:Improper Access Control lead to Remote Code Execution (CVE-2020-8591)

Improper Access Control to Remote Code Execution (CVE-2020-8591)

I will show how I hacked a whole system by exploiting improper access control vulnerability in the popular java-based MaaS software "eG Manager" and how I can escalated it to execute code remotely.

Impact

The Improper Access Control weakness describes a case where software fails to restrict access to an object properly. A malicious user can compromise security of the software and perform certain unauthorized actions by gaining elevated privileges, reading otherwise restricted information, executing commands, bypassing implemented security mechanisms, etc. 

Technical Analysis

"eG Manager" has direct admin panel access feature and then it was missing session management control, e.g. if users may not want to login via the login interface provided by eG Enterprise. For instance, they can use access key to directly connect to the eG management console from the portal. "eG Manager" used predefined access key for authentication. An attacker can exploit this feature by using single access key. Since, eG Manager is used for internal network monitoring process, I could accessed their internal network via remote code execution. 

Exploiting Improper access control to Remote Code Execution

While I pen-testing "eG Manager", I read their documentation and found some interesting. If a user is already logged into a web portal, he/she may not want to login again to gain access to the eG user interface; instead, they may want to directly connect to the eG management console. they can use access key. 
I thought, Can I access their admin panel without entering any password, even I have never logged before? We can be easily found access key in their documentation. So I tried to access admin panel by using the following URL:
https://<eGmanagerIP>:<eGmanagerport>/final/servlet/com.egurkha.EgLoginServlet?uname=admin&upass=&accessKey=eGm0n1t0r
Yeah!!! I have successfully logged into their admin panel because the eG Enterprise system will automatically pick the password that corresponds to the specified uname from the database. There was command execution function in Admin>Settings>Manager.
The option was enabled. Any commands can be executed in Admin> Agents> Agent Status> Remote Control. 
That is means I can control any company internal network which are using eG Manager. 

Time Line

Date           What
2020/01/30 Vulnerability reported to eG Innovations, Inc.
2020/01/30 Vendor addressed issue in < 7.1.2
2020/01/31 Vendor fixed and notify their customers.

Summary

In this post I analyzed improper access control vulnerability in "eG Manager v7.1.2" which can be triggered through a single access key. I found that it is possible to leverage the issue into Remote Code Execution if the "eG Manager" instance relies on the command execution function. I would like to thank the "eG Innovations, Inc" security team for the professional communication and for the very fast resolution of the issue.

Comments

  1. Wow it is really wonderful and awesome thus it is very much useful for me to understand many concepts and helped me a lot. it is really explainable very well and i got more information from your blog
    Access Control

    ReplyDelete
  2. Nursing Care services at home means, a lot of travelling, traffic struggles and long waiting lines. More Information Call Now: +91-845-911-1920

    ReplyDelete
  3. health care services in Delhi business employs individuals that are dedicated towards their respective roles and put in a lot of effort to achieve the common vision and larger goals of the company. In the near future, this business aims to expand its line of products and services and cater to a larger client base. More Information Call Now: +91-845-911-1920

    ReplyDelete
  4. attendant services in delhi attendant at home is quite an affordable option and we assist our patients in their daily needs and requirement in the comfort of their own home. Our caretakers are responsible and experienced in taking care of patient's day-to-day work including the physical, mental and social activities. Whether it’s personal hygiene, mobilization, bathing, feeding or involving patient into some activities for mental care, caregivers help them with everything! More Information Call Now: +91-845-911-1920

    ReplyDelete
  5. A is a very extensive and vast knowledgeable platform that has been given by this blog. Thanks for sharing this helpful blog.
    Access Control

    ReplyDelete

Post a Comment

Popular posts from this blog

eG Manager v7.1.2: SQL Injection lead to Remote Code Execution (CVE-2020-8592)

SQL Injection lead to Remote Code Execution (CVE-2020-8592) In this blog post I will show how to exploit a SQL injection vulnerability in the popular java-based MaaS software "eG Manager" and how I can escalated it to execute code remotely. Impact The SQL injection vulnerability can be exploited as an unauthenticated attacker via forgot password function. An attacker is able to execute stacked SQL queries which means it is possible to manipulate arbitrary database entries and even execute shell commands. Technical Analysis eG Manager has a forgot password feature and then there was missing input validation function, e.g. If the Username specified is valid, then the password will be emailed to the user with the given Username. If not so, server shows 'username does not exist'. An attacker can exploit this feature by injecting stacked queries SQL syntax. Exploiting SQL Injection to Remote Code Execution In "Forgot Password" area, there is an inp