Struts your way into Strongkey [RCE]
Intro
Back to Feb 1, 2020 at 5:53PM, I reported a critical vulnerability issue that gives me a remote code execution(RCE) on StrongKey company. To those who don’t know, StrongAuth, or StrongKey is a security based company that “makes data breach irrelevant, with StrongKey technology, your data becomes worthless to hackers” as stated on their website !.
About the company by CyberDb :
“StrongAuth, Inc. is a Silicon Valley company focused on Symmetric Key Management, Encryption, Tokenization and PKI and FIDO-based Strong-Authentication. StrongAuth has defined a unique web-application architecture – Regulatory Compliant Cloud Computing (RC3) – which enables secure cloud-computing while complying with data-security regulations anywhere in the world.”
Enough speaking !
Spotting the vulnerability
As usual, conducting my research and don’t know how the strongAuth web app kicks my browser, clicked around found myself into partner subdomain. Quick look at the url, I recognized the extension .action, directly went to test for the Struts CVE-2017-563, as I already seen that pattern from some reads I did before.
Exploitation
I grabbed the public exploit 41570 and did a quick check, and okey I was in !
Here is my PoC:
Notes
- Keep your eyes on recent CVES, reverse them if no public exploit exists, and always keep a good reads habit.
- No matter what company’s size, there will be always some flaws here and there.
- Even if the main company’s mission is protection, they missed out to patch the bug before. And breaches comes from here !