module

Mirth Connect Deserialization RCE

Disclosed
Oct 25, 2023
Created
Jan 30, 2024

Description

A vulnerability exists within Mirth Connect due to its mishandling of deserialized data. This vulnerability
can be leveraged by an attacker using a crafted HTTP request to execute OS commands within the context of the
target application. The original vulnerability was identified by IHTeam and assigned CVE-2023-37679. Later,
researchers from Horizon3.ai determined the patch to be incomplete and published a gadget chain which bypassed
the deny list that the original had implemented. This second vulnerability was assigned CVE-2023-43208 and was
patched in Mirth Connect version 4.4.1. This module has been tested on versions 4.1.1, 4.3.0 and 4.4.0.

Authors

r00t
Naveen Sunkavally
Spencer McIntyre

Platform

Linux,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/mirth_connect_cve_2023_43208
msf exploit(mirth_connect_cve_2023_43208) > show targets
...targets...
msf exploit(mirth_connect_cve_2023_43208) > set TARGET < target-id >
msf exploit(mirth_connect_cve_2023_43208) > show options
...show and set options...
msf exploit(mirth_connect_cve_2023_43208) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.