Werkzeug is a comprehensive WSGI web application library. It began as a simple collection of various utilities for WSGI applications and has become one of the most advanced WSGI utility libraries. It is commonly used for Flask web application.
Practice
Console RCE
If debug is active you could try to access to /console endpoint or to trigger a Werkzeug error and gain RCE.
In some occasions the /console endpoint is going to be protected by a pin. If you have a file traversal vulnerability, you can leak all the necessary info to generate that pin.
According to the Werkzeug PIN generation source code, here are the needed variables to generate the PIN code:
It's generally Flask but it may change depending of how the server has been started. Check this video for details.
You may want to download application files, edit python3.5/site-packages/werkzeug/debug/__init__.py to make it print probably_public_bits and run it locally to get the right variable.
getattr(mod, '__file__', None)
is the absolute path of app.py in the flask directory (e.g. /usr/local/lib/python3.5/dist-packages/flask/app.py). If app.py doesn't work, try app.pycYou may find this information in the Werkzeug error message.
private_bits
uuid.getnode()
is the MAC address of the current computer, str(uuid.getnode()) is the decimal expression of the mac address.
To find server MAC address, need to know which network interface is being used to serve the app (e.g. ens3). If unknown, leak /proc/net/arp for device ID and then leak MAC address at /sys/class/net/<device id>/address.
Convert from hex address to decimal representation by running in python e.g.:
# It was 56:00:02:7a:23:ac>>>print(0x5600027a23ac)94558041547692
Side note: It looks like Ubuntu Desktop doesn’t return “correct” values for getnode
get_machine_id()
concatenate the values in /etc/machine-id or /proc/sys/kernel/random/boot_id with the first line of /proc/self/cgroup after the last slash (/).
To clarify, here is the code used by Werkzeug to generate the machine_id
def get_machine_id() -> t.Optional[t.Union[str, bytes]]:
global _machine_idif _machine_id isnotNone:return _machine_iddef_generate() -> t.Optional[t.Union[str,bytes]]: linux =b""# machine-id is stable across boots, boot_id is not.for filename in"/etc/machine-id","/proc/sys/kernel/random/boot_id":try:withopen(filename, "rb")as f: value = f.readline().strip()exceptOSError:continueif value: linux += valuebreak# Containers share the same machine id, add some cgroup# information. This is used outside containers too but should be# relatively stable across boots.try:withopen("/proc/self/cgroup", "rb")as f: linux += f.readline().strip().rpartition(b"/")[2]exceptOSError:passif linux:return linux# On OS X, use ioreg to get the computer's serial number.try:
Once all variables prepared, run exploit script to generate Werkzeug console PIN:
Generate the PIN
You can use the following code with previous values to generate a valid PIN code