VShell and SparkRAT Observed in Exploitation of BeyondTrust ...#1923
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
VShell and SparkRAT Observed in Exploitation of BeyondTrust ...#1923carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://unit42.paloaltonetworks.com/beyondtrust-cve-2026-1731/ Content Categories: Based on the analysis, this content was categorized under "Pentesting Web -> Command Injection (bash arithmetic evaluation / WebSocket-handshake parameter injection) and/or Network Services Pentesting -> 80,443 - Pentesting Web (WebSockets). Also consider adding the persistence technique under Linux Post-Exploitation or Webshells/Persistence notes (Apache config STOMPing).". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title / Context
Unit 42 analyzed in-the-wild exploitation of CVE-2026-1731 affecting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA). BeyondTrust published advisory BT26-02 on Feb 6, 2026; Unit 42 published this post on Feb 19, 2026. The bug is a pre-auth remote code execution that allows attackers to execute operating system commands as the appliance “site user” (not root, but sufficiently privileged to...
🔧 Technical Details
Pre-auth WebSocket RCE via bash arithmetic evaluation of a client version field:
If a network-reachable WebSocket handler passes a client-controlled “version” parameter (e.g.,
remoteVersion) into bash arithmetic contexts like(( ... ))orlet, and validation is not strict, attackers can inject bash expressions containing command substitution (e.g.,$(command)). Because bash evaluates expansions during arithmetic processing, a payload shaped likea[$(cmd)]0can trigger command execution while the script is “just” comparing versions, resulting in unauthenticated OS command execution.Ephemeral admin takeover by swapping password hashes using the application’s own hashing utility:
After gaining code execution, attackers can minimize artifacts by (1) reading and backing up the admin user’s existing password hash from the application DB (e.g., User ID 1), (2) generating a valid hash for a ...
🤖 Agent Actions
Updated
src/pentesting-web/command-injection.mdwith new WebSocket handshake bash arithmetic RCE technique, detailed post-exploitation tradecraft (ephemeral admin hash swaps, gated PHP webshell behaviors, Apache config STOMPing persistence, DNS/OAST validation), and an enhanced DNS exfiltration snippet with compliant label chunking. Added relevant reference to the Unit 42 BeyondTrust CVE-2026-1731 blog.This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.