Files
metasploit-gs/tools/modules/module_reference.rb
T

259 lines
6.6 KiB
Ruby
Raw Normal View History

2007-10-02 16:09:13 +00:00
#!/usr/bin/env ruby
#
# This script lists each module with its references
2007-10-02 16:09:13 +00:00
#
msfbase = __FILE__
while File.symlink?(msfbase)
2013-09-30 13:47:53 -05:00
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end
2015-10-06 10:30:52 -05:00
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), '..', '..', 'lib')))
2012-04-15 23:35:38 -05:00
require 'msfenv'
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
2007-10-02 16:09:13 +00:00
require 'rex'
require 'msf/ui'
require 'msf/base'
2014-11-05 09:57:13 -06:00
require 'uri'
# See lib/msf/core/module/reference.rb
# We gsub '#{in_ctx_val}' with the actual value
def types
{
2015-09-01 23:25:01 -05:00
'ALL' => '',
'OSVDB' => 'http://www.osvdb.org/#{in_ctx_val}',
'CVE' => 'http://cvedetails.com/cve/#{in_ctx_val}/',
'CWE' => 'http://cwe.mitre.org/data/definitions/#{in_ctx_val}.html',
'BID' => 'http://www.securityfocus.com/bid/#{in_ctx_val}',
'MSB' => 'http://technet.microsoft.com/en-us/security/bulletin/#{in_ctx_val}',
'EDB' => 'http://www.exploit-db.com/exploits/#{in_ctx_val}',
'US-CERT-VU' => 'http://www.kb.cert.org/vuls/id/#{in_ctx_val}',
'ZDI' => 'http://www.zerodayinitiative.com/advisories/ZDI-#{in_ctx_val}',
'WPVDB' => 'https://wpvulndb.com/vulnerabilities/#{in_ctx_val}',
'PACKETSTORM' => 'https://packetstormsecurity.com/files/#{in_ctx_val}',
'URL' => '#{in_ctx_val}'
2014-11-05 09:57:13 -06:00
}
end
2007-10-02 16:09:13 +00:00
2014-11-05 09:57:13 -06:00
STATUS_ALIVE = 'Alive'
STATUS_DOWN = 'Down'
STATUS_UNSUPPORTED = 'Unsupported'
2015-11-19 11:30:16 -06:00
sort = 0
filter = 'All'
filters = ['all','exploit','payload','post','nop','encoder','auxiliary']
type ='ALL'
match = nil
check = false
save = nil
http_timeout = 20
$verbose = false
opts = Rex::Parser::Arguments.new(
2013-09-30 13:47:53 -05:00
"-h" => [ false, "Help menu." ],
2014-11-05 09:57:13 -06:00
"-c" => [ false, "Check reference status"],
2013-09-30 13:47:53 -05:00
"-s" => [ false, "Sort by Reference instead of Module Type."],
"-r" => [ false, "Reverse Sort"],
2014-11-05 09:57:13 -06:00
"-f" => [ true, "Filter based on Module Type [All,Exploit,Payload,Post,NOP,Encoder,Auxiliary] (Default = ALL)."],
"-t" => [ true, "Type of Reference to sort by #{types.keys}"],
"-x" => [ true, "String or RegEx to try and match against the Reference Field"],
2015-11-19 11:30:16 -06:00
"-o" => [ true, "Save the results to a file"],
"-i" => [ true, "Set an HTTP timeout"],
"-v" => [ false, "Verbose"]
)
2014-11-05 09:57:13 -06:00
flags = []
opts.parse(ARGV) { |opt, idx, val|
2013-09-30 13:47:53 -05:00
case opt
when "-h"
puts "\nMetasploit Script for Displaying Module Reference information."
puts "=========================================================="
puts opts.usage
exit
2014-11-05 09:57:13 -06:00
when "-c"
flags << "URI Check: Yes"
check = true
2013-09-30 13:47:53 -05:00
when "-s"
2014-11-05 09:57:13 -06:00
flags << "Order: Sorting by License"
2013-09-30 13:47:53 -05:00
sort = 1
when "-r"
2014-11-05 09:57:13 -06:00
flags << "Order: Reverse Sorting"
2013-09-30 13:47:53 -05:00
sort = 2
when "-f"
unless filters.include?(val.downcase)
puts "Invalid Filter Supplied: #{val}"
puts "Please use one of these: #{filters.map{|f|f.capitalize}.join(", ")}"
exit
end
2014-11-05 09:57:13 -06:00
flags << "Module Filter: #{val}"
2013-09-30 13:47:53 -05:00
filter = val
when "-t"
2014-11-05 15:26:00 -06:00
val = (val || '').upcase
unless types.has_key?(val)
2013-09-30 13:47:53 -05:00
puts "Invalid Type Supplied: #{val}"
2014-11-05 09:57:13 -06:00
puts "Please use one of these: #{types.keys.inspect}"
2013-09-30 13:47:53 -05:00
exit
end
type = val
2015-11-19 11:30:16 -06:00
when "-i"
http_timeout = /^\d+/ === val ? val.to_i : 20
when "-v"
$verbose = true
2013-09-30 13:47:53 -05:00
when "-x"
2014-11-05 09:57:13 -06:00
flags << "Regex: #{val}"
2013-09-30 13:47:53 -05:00
match = Regexp.new(val)
2014-11-05 10:58:41 -06:00
when "-o"
flags << "Output to file: Yes"
save = val
2013-09-30 13:47:53 -05:00
end
}
2014-11-05 09:57:13 -06:00
flags << "Type: #{type}"
2014-11-05 09:57:13 -06:00
puts flags * " | "
def get_ipv4_addr(hostname)
Rex::Socket::getaddresses(hostname, false)[0]
end
2015-11-19 11:30:16 -06:00
def vprint_debug(msg='')
print_debug(msg) if $verbose
end
def print_debug(msg='')
$stderr.puts "[*] #{msg}"
end
def is_url_alive?(uri, http_timeout)
print_debug("Checking: #{uri}")
2014-11-05 09:57:13 -06:00
begin
uri = URI(uri)
rhost = get_ipv4_addr(uri.host)
rescue SocketError, URI::InvalidURIError => e
2015-11-19 11:30:16 -06:00
vprint_debug("#{e.message} in #is_url_alive?")
2014-11-05 09:57:13 -06:00
return false
end
rport = uri.port || 80
path = uri.path.blank? ? '/' : uri.path
vhost = rport == 80 ? uri.host : "#{uri.host}:#{rport}"
if uri.scheme == 'https'
cli = ::Rex::Proto::Http::Client.new(rhost, 443, {}, true, 'TLS1')
else
cli = ::Rex::Proto::Http::Client.new(rhost, rport)
end
begin
2015-11-19 11:30:16 -06:00
cli.connect(http_timeout)
2014-11-05 09:57:13 -06:00
req = cli.request_raw('uri'=>path, 'vhost'=>vhost)
2015-11-19 11:30:16 -06:00
res = cli.send_recv(req, http_timeout)
2014-11-05 09:57:13 -06:00
rescue Errno::ECONNRESET, Rex::ConnectionError, Rex::ConnectionRefused, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::UnsupportedProtocol, ::Timeout::Error, Errno::ETIMEDOUT => e
2015-11-19 11:30:16 -06:00
vprint_debug("#{e.message} for #{uri}")
2014-11-05 09:57:13 -06:00
return false
ensure
cli.close
end
if res.nil? || res.code == 404 || res.body =~ /<title>.*not found<\/title>/i
2015-11-19 11:30:16 -06:00
vprint_debug("URI returned a not-found response: #{uri}")
2015-09-01 23:25:01 -05:00
return false
2014-11-05 09:57:13 -06:00
end
2015-11-19 11:30:16 -06:00
vprint_debug("Good: #{uri}")
2014-11-05 09:57:13 -06:00
true
end
2007-10-02 16:09:13 +00:00
2014-11-05 10:58:41 -06:00
def save_results(path, results)
begin
2014-11-05 15:26:00 -06:00
File.open(path, 'wb') do |f|
2014-11-05 10:58:41 -06:00
f.write(results)
end
puts "Results saved to: #{path}"
2014-11-05 15:26:00 -06:00
rescue Exception => e
puts "Failed to save the file: #{e.message}"
2014-11-05 10:58:41 -06:00
end
end
2011-06-07 01:25:12 +00:00
# Always disable the database (we never need it just to list module
# information).
framework_opts = { 'DisableDatabase' => true }
# If the user only wants a particular module type, no need to load the others
if filter.downcase != 'all'
2013-09-30 13:47:53 -05:00
framework_opts[:module_types] = [ filter.downcase ]
2011-06-07 01:25:12 +00:00
end
2007-10-02 16:09:13 +00:00
# Initialize the simplified framework instance.
2011-06-07 01:25:12 +00:00
$framework = Msf::Simple::Framework.create(framework_opts)
2014-11-05 09:57:13 -06:00
if check
columns = [ 'Module', 'Status', 'Reference' ]
else
columns = [ 'Module', 'Reference' ]
end
2007-10-02 16:09:13 +00:00
tbl = Rex::Ui::Text::Table.new(
2013-09-30 13:47:53 -05:00
'Header' => 'Module References',
2014-11-05 09:57:13 -06:00
'Indent' => 2,
'Columns' => columns
2007-10-02 16:09:13 +00:00
)
2014-11-05 09:57:13 -06:00
bad_refs_count = 0
2011-06-07 01:25:12 +00:00
$framework.modules.each { |name, mod|
2013-09-30 13:47:53 -05:00
next if match and not name =~ match
x = mod.new
x.references.each do |r|
2014-11-05 09:57:13 -06:00
ctx_id = r.ctx_id.upcase
if type == 'ALL' || type == ctx_id
if check
if types.has_key?(ctx_id)
uri = types[r.ctx_id.upcase].gsub(/\#{in_ctx_val}/, r.ctx_val)
2015-11-19 11:30:16 -06:00
if is_url_alive?(uri, http_timeout)
2014-11-05 09:57:13 -06:00
status = STATUS_ALIVE
else
bad_refs_count += 1
status = STATUS_DOWN
end
else
# The reference ID isn't supported so we don't know how to check this
bad_refs_count += 1
status = STATUS_UNSUPPORTED
end
end
2013-09-30 13:47:53 -05:00
ref = "#{r.ctx_id}-#{r.ctx_val}"
2014-11-05 09:57:13 -06:00
new_column = []
new_column << x.fullname
new_column << status if check
new_column << ref
tbl << new_column
2013-09-30 13:47:53 -05:00
end
end
2011-06-07 01:25:12 +00:00
}
if sort == 1
2013-09-30 13:47:53 -05:00
tbl.sort_rows(1)
end
if sort == 2
2013-09-30 13:47:53 -05:00
tbl.sort_rows(1)
tbl.rows.reverse
end
2007-10-02 16:09:13 +00:00
2014-11-05 09:57:13 -06:00
puts
2009-01-10 22:26:58 +00:00
puts tbl.to_s
2014-11-05 15:26:00 -06:00
puts
2014-11-05 15:07:40 -06:00
2014-11-05 15:26:00 -06:00
puts "Number of bad references found: #{bad_refs_count}" if check
2014-11-05 15:14:35 -06:00
save_results(save, tbl.to_s) if save