Bomgar Remote Support Unauthenticated Code Execution

This Metasploit module exploits a vulnerability in the Bomgar Remote Support, which deserializes user provided data using PHP’s unserialize method. By providing an specially crafted PHP serialized object, it is possible to write arbitrary data to arbitrary files. This effectively allows the execution of arbitrary PHP code in the context of the Bomgar Remote Support system user. To exploit the vulnerability, a valid Logging Session ID (LSID) is required. It consists of four key-value pairs (i. e., ‘h=[…];l=[…];m=[…];t=[…]’) and can be retrieved by an unauthenticated user at the end of the process of submitting a new issue via the ‘Issue Submission’ form. Versions before 15.1.1 are reported to be vulnerable.

Leave a Reply