-
Notifications
You must be signed in to change notification settings - Fork 14.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exploit module for BeyondTrust Privileged Remote Access & Remote Support (CVE-2024-12356, CVE-2025-1094) #19877
Conversation
…led by default, and we hit the SQLi directly.
…ndocumented API endpoint to discover the target site company name.
Adding a comment here to mention that this module relies on #19834 - to fix an issue with WebSockets, so dropping the module into an older version of the framework wont work, you need to run MSF that has the WebSocket bug fix in it (MSF 6.4.47 and above). |
Co-authored-by: Julien Voisin <[email protected]>
Co-authored-by: msutovsky-r7 <[email protected]>
Co-authored-by: Julien Voisin <[email protected]>
Co-authored-by: msutovsky-r7 <[email protected]>
…er bound version number, and the patch does not change the version number.
…e patch being applied, warning a user of a WebSocket getting closed unexpectadly
I added commit 6f1287d, to warn a user if the exploit detects the WebSocket connection having been closed unexpectedly, as this is a strong indication the target has the patch For example, running against a patched target now gives this:
This works because the patch + elif [[ ! "$gskey" =~ ^[a-zA-Z0-9]{32}$ ]]; then
+ blog "bad session key given: [$gskey]"
+ exit 1
else |
…ll check for the same thing as part of its matching expression. Thanks msutovsky-r7 for spoting this.
Release NotesThe module exploits two bugs CVE-2024-12356 and CVE-2025-1094, an argument injection in BeyondTrust code base and SQL injection in PostgreSQL code base, respectively. |
Overview
This pull request adds an unauthenticated RCE exploit module targeting BeyondTrust Privileged Remote Access & Remote Support, leveraging CVE-2024-12356 + CVE-2025-1094.
CVE-2024-12356 is an argument injection issue in the BeyondTrust code base, and CVE-2025-1094 is a SQL injection issue in the PostgreSQL code base (shipped as a component in the BeyondTrust appliance).
The exploit can either leverage CVE-2024-12356 and CVE-2025-1094 together, or solely leverage CVE-2025-1094 (this is the default) for RCE. Arbitrary code execution is achieved with the privileges of the current site user (i.e. not root).
For a full technical analysis of the vulnerabilities, please read our AttackerKB Rapid7 Analysis.
Example