Rapid7 Vulnerability & Exploit Database

SysAid Help Desk Arbitrary File Download

Back to Search

SysAid Help Desk Arbitrary File Download

Disclosed
06/03/2015
Created
05/30/2018

Description

This module exploits two vulnerabilities in SysAid Help Desk that allows an unauthenticated user to download arbitrary files from the system. First, an information disclosure vulnerability (CVE-2015-2997) is used to obtain the file system path, and then we abuse a directory traversal (CVE-2015-2996) to download the file. Note that there are some limitations on Windows, in that the information disclosure vulnerability doesn't work on a Windows platform, and we can only traverse the current drive (if you enter C:\afile.txt and the server is running on D:\ the file will not be downloaded). This module has been tested with SysAid 14.4 on Windows and Linux.

Author(s)

  • Pedro Ribeiro <pedrib@gmail.com>

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/sysaid_file_download
msf auxiliary(sysaid_file_download) > show actions
    ...actions...
msf auxiliary(sysaid_file_download) > set ACTION < action-name >
msf auxiliary(sysaid_file_download) > show options
    ...show and set options...
msf auxiliary(sysaid_file_download) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;