Skip to content

This application utilized the Self Registration feature to create a rogue agent that then dumps ApplianceConfiguration settings which may or may not contain information such as plain text passwords. This was reported to SolarWinds PSIRT on 10/10/2019 with very little feedback.

Notifications You must be signed in to change notification settings

flipfloptech/nCentralDumpsterDiver

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SolarWinds n-Central Dumpster Diver

Description / Explanation

FIXES/WORKAROUNDS have been released for more information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7984

This application utilizes the nCentral agent dot net libraries to simulate the agent registration and pull the agent/appliance configuration settings. This information can contain plain text active directory domain credentials. This was reported to SolarWinds PSIRT([email protected]) on 10/10/2019. In most cases the agent download URL is not secured allowing anyone without authorization and known customer id to download the agent software. Once you have a customer id you can self register and pull the config. Application will test availability of customer id via agent download URL. If successful it will then pull the config. We do not attempt to just pull the config because timing out on the operation takes to long. Removing the initial check, could produce more results as the agent download could be being blocked where as agent communication would not be.

Harmony is only used to block the nCentral libraries from saving and creating a "config" directory that is not needed.

Usage

nCentralDumpsterDiver 1.0.0.0
Copyright c  2020
ERROR(S):
  Required option 'u, url' is missing.
  -u, --url           Required. URLs to be Processed
  -i, --id            Customer IDs to try processing, will be excluded from bruteforce

  -b, --bruteforce    (Default: false) Enable Customer ID BruteForce
  --min               (Default: 100) Minimum Customer ID to try for bruteforce.
  --max               (Default: 200) Maximum Customer ID to try for bruteforce.
  --help              Display this help screen.
  --version           Display version information.`

Example

 C:\Storage\nCentralDumpsterDiver>nCentralDumpsterDiver.exe -u https://nable.localhost.localdomain/ -b
[10:49:00 INF] Processing https://nable.localhost.localdomain/ started
[10:49:00 INF] Starting bruteforce, this will exclude any previously specified customer id(s)

Seeing is believing

Search

Run

Review

About

This application utilized the Self Registration feature to create a rogue agent that then dumps ApplianceConfiguration settings which may or may not contain information such as plain text passwords. This was reported to SolarWinds PSIRT on 10/10/2019 with very little feedback.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages