Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Info Disclosure between Mythic Instances when using SSH tunnels #302

Open
coldwaterq opened this issue Jun 8, 2023 · 2 comments
Open

Info Disclosure between Mythic Instances when using SSH tunnels #302

coldwaterq opened this issue Jun 8, 2023 · 2 comments

Comments

@coldwaterq
Copy link

If Team A and Team B have Mythic setup so that you have to ssh tunnel into a host in order to view the web console. Then if one user moves from Team A to Team B. The localstorage for 127.0.0.1:7443 will contain semi-sensitive information of Team A that can be loaded by Team B's instance of Mythic in that user's browser.

In our case it caused a minor heart attack because it seemed agents were calling back to a c2 that shouldn't have been possible.

This is simply a symptom of the ssh port forwarding, however given the typical use case of Mythic, it may be worth solving.

Not knowing the code base very well, my idea for how to solve it would be to use the simplest crypto library you can, and have each server use a unique symmetric encryption key on things such as openTabs.

@its-a-feature
Copy link
Owner

Are you connecting to Mythic in this way via something like ssh -L 127.0.0.1:7443:127.0.0.1:7443 user@mythic? And you're swapping between Team A and Team B by simply changing the host you're ssh-ing into?

@coldwaterq
Copy link
Author

coldwaterq commented Jun 16, 2023 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants