2020-04-15 04:51:39 -05:00
# -*- coding: binary -*-
#
2020-04-15 10:32:17 -05:00
# This mixin is a wrapper around Net::LDAP
2020-04-15 04:51:39 -05:00
#
2021-12-16 18:47:52 -05:00
require 'rex/proto/ldap'
2023-07-19 13:05:23 +01:00
require 'metasploit/framework/ldap/client'
2020-04-15 04:51:39 -05:00
module Msf
2020-07-25 00:13:12 +02:00
module Exploit::Remote::LDAP
2022-12-14 12:59:27 -05:00
include Msf :: Exploit :: Remote :: Kerberos :: Ticket :: Storage
2023-01-20 11:31:24 +00:00
include Msf :: Exploit :: Remote :: Kerberos :: ServiceAuthenticator :: Options
2023-07-05 12:48:57 +01:00
include Metasploit :: Framework :: LDAP :: Client
2022-12-14 12:59:27 -05:00
2022-12-30 16:07:08 -06:00
# Initialize the LDAP client and set up the LDAP specific datastore
2023-01-04 11:09:23 -06:00
# options to allow the client to perform authentication and timeout
# operations. Acts as a wrapper around the caller's
# implementation of the `initialize` method, which will usually be
# the module's class's implementation, such as lib/msf/core/auxiliary.rb.
2022-12-30 16:07:08 -06:00
#
# @param info [Hash] A hash containing information about the module
# using this library which includes its name, description, author, references,
# disclosure date, license, actions, default action, default options,
# and notes.
2020-07-25 00:13:12 +02:00
def initialize ( info = { } )
super
register_options ( [
Opt :: RHOST ,
Opt :: RPORT ( 389 ) ,
OptBool . new ( 'SSL' , [ false , 'Enable SSL on the LDAP connection' , false ] ) ,
2022-06-16 15:49:58 -04:00
Msf :: OptString . new ( 'DOMAIN' , [ false , 'The domain to authenticate to' ] ) ,
Msf :: OptString . new ( 'USERNAME' , [ false , 'The username to authenticate with' ] , aliases : [ 'BIND_DN' ] ) ,
2023-02-27 11:07:21 -06:00
Msf :: OptString . new ( 'PASSWORD' , [ false , 'The password to authenticate with' ] , aliases : [ 'BIND_PW' ] )
2020-07-25 00:13:12 +02:00
] )
2023-01-20 11:31:24 +00:00
register_advanced_options (
[
2023-06-14 00:40:33 +01:00
Opt :: Proxies ,
2023-01-20 11:31:24 +00:00
* kerberos_storage_options ( protocol : 'LDAP' ) ,
* kerberos_auth_options ( protocol : 'LDAP' , auth_methods : Msf :: Exploit :: Remote :: AuthOption :: LDAP_OPTIONS ) ,
2023-02-27 11:07:21 -06:00
Msf :: OptPath . new ( 'LDAP::CertFile' , [ false , 'The path to the PKCS12 (.pfx) certificate file to authenticate with' ] , conditions : [ 'LDAP::Auth' , '==' , Msf :: Exploit :: Remote :: AuthOption :: SCHANNEL ] ) ,
2023-01-20 11:31:24 +00:00
OptFloat . new ( 'LDAP::ConnectTimeout' , [ true , 'Timeout for LDAP connect' , 10 . 0 ] )
]
)
2020-07-25 00:13:12 +02:00
end
2020-04-15 04:51:39 -05:00
2022-12-30 16:07:08 -06:00
# Alias to return the RHOST datastore option.
#
2023-01-04 11:09:23 -06:00
# @return [String] The current value of RHOST in the datastore.
2020-07-25 00:13:12 +02:00
def rhost
datastore [ 'RHOST' ]
end
2020-07-22 14:23:00 -05:00
2022-12-30 16:07:08 -06:00
# Alias to return the RPORT datastore option.
#
2023-01-04 11:09:23 -06:00
# @return [String] The current value of RPORT in the datastore.
2020-07-25 00:13:12 +02:00
def rport
datastore [ 'RPORT' ]
end
2020-04-15 04:51:39 -05:00
2022-12-30 16:07:08 -06:00
# Return the peer as a host:port formatted string.
#
# @return [String] A string containing the peer details in RHOST:RPORT format.
2020-07-25 00:13:12 +02:00
def peer
" #{ rhost } : #{ rport } "
end
2020-04-15 04:51:39 -05:00
2022-12-30 16:07:08 -06:00
# Set the various connection options to use when connecting to the
2023-01-04 11:09:23 -06:00
# target LDAP server based on the current datastore options. Returns
# the resulting connection configuration as a hash.
2022-12-30 16:07:08 -06:00
#
# @return [Hash] The options to use when connecting to the target
# LDAP server.
2021-12-18 09:03:56 -05:00
def get_connect_opts
2023-07-05 12:48:57 +01:00
opts = {
username : datastore [ 'USERNAME' ] ,
password : datastore [ 'PASSWORD' ] ,
domain : datastore [ 'DOMAIN' ] ,
domain_controller_rhost : datastore [ 'DomainControllerRhost' ] ,
ldap_auth : datastore [ 'LDAP::Auth' ] ,
ldap_cert_file : datastore [ 'LDAP::CertFile' ] ,
ldap_rhostname : datastore [ 'Ldap::Rhostname' ] ,
ldap_krb_offered_enc_types : datastore [ 'Ldap::KrbOfferedEncryptionTypes' ] ,
ldap_krb5_cname : datastore [ 'Ldap::Krb5Ccname' ] ,
2023-07-18 22:48:00 +01:00
proxies : datastore [ 'Proxies' ] ,
framework_module : self
2020-07-25 00:13:12 +02:00
}
2020-04-15 04:51:39 -05:00
2023-07-05 12:48:57 +01:00
ldap_connect_opts ( rhost , rport , datastore [ 'LDAP::ConnectTimeout' ] , ssl : datastore [ 'SSL' ] , opts : opts )
2023-07-18 22:48:00 +01:00
end
2023-07-05 12:48:57 +01:00
2023-07-18 22:48:00 +01:00
# @see #ldap_open
# @return [Object] The result of whatever the block that was
# passed in via the "block" parameter yielded.
def ldap_connect ( opts = { } , & block )
ldap_open ( get_connect_opts . merge ( opts ) , & block )
2020-07-22 14:23:00 -05:00
end
2022-12-30 16:07:08 -06:00
# Connect to the target LDAP server using the options provided,
2023-01-04 11:09:23 -06:00
# and pass the resulting connection object to the proc provided.
# Terminate the connection once the proc finishes executing.
2022-12-30 16:07:08 -06:00
#
2023-07-24 19:13:04 +01:00
# @param connect_opts [Hash] Options for the LDAP connection.
2023-01-05 17:44:24 -06:00
# @param block [Proc] A proc containing the functionality to execute
2022-12-30 16:07:08 -06:00
# after the LDAP connection has succeeded. The connection is closed
# once this proc finishes executing.
# @see Net::LDAP.open
2023-01-05 10:51:18 -06:00
# @return [Object] The result of whatever the block that was
# passed in via the "block" parameter yielded.
2023-07-18 22:48:00 +01:00
def ldap_open ( connect_opts , & block )
opts = resolve_connect_opts ( connect_opts )
Net :: LDAP . open ( opts , & block )
end
def resolve_connect_opts ( connect_opts )
2023-07-24 19:13:04 +01:00
return connect_opts unless connect_opts . dig ( :auth , :initial_credential ) . is_a? ( Proc )
2023-07-18 22:48:00 +01:00
opts = connect_opts . dup
# For scenarios such as Kerberos, we might need to make additional calls out to a separate services to acquire an initial credential
opts [ :auth ] . merge! (
initial_credential : opts [ :auth ] [ :initial_credential ] . call
)
opts
2020-07-25 00:13:12 +02:00
end
2020-04-15 10:32:17 -05:00
2022-12-30 16:07:08 -06:00
# Create a new LDAP connection using Net::LDAP.new and yield the
2023-01-04 11:09:23 -06:00
# resulting connection object to the caller of this method.
2022-12-30 16:07:08 -06:00
#
# @param opts [Hash] A hash containing the connection options for the
# LDAP connection to the target server.
2023-01-04 11:09:23 -06:00
# @yieldparam ldap [Net::LDAP] The LDAP connection handle to use for connecting to
# the target LDAP server.
2020-07-25 00:13:12 +02:00
def ldap_new ( opts = { } )
2023-07-18 22:48:00 +01:00
ldap = Net :: LDAP . new ( resolve_connect_opts ( get_connect_opts . merge ( opts ) ) )
2020-07-25 00:13:12 +02:00
# NASTY, but required
2023-01-04 11:09:23 -06:00
# monkey patch ldap object in order to ignore bind errors
# Some servers (e.g. OpenLDAP) return result even after a bind
# has failed, e.g. with LDAP_INAPPROPRIATE_AUTH - anonymous bind disallowed.
# See: https://www.openldap.org/doc/admin23/security.html#Authentication%20Methods
# "Note that disabling the anonymous bind mechanism does not prevent anonymous
# access to the directory."
# Bug created for Net:LDAP at https://github.com/ruby-ldap/ruby-net-ldap/issues/375
2020-07-25 00:13:12 +02:00
#
2023-01-04 11:09:23 -06:00
# @yieldparam conn [Net::LDAP] The LDAP connection handle to use for connecting to
# the target LDAP server.
2022-12-30 16:07:08 -06:00
# @param args [Hash] A hash containing options for the ldap connection
2020-07-25 00:13:12 +02:00
def ldap . use_connection ( args )
if @open_connection
yield @open_connection
else
begin
conn = new_connection
conn . bind ( args [ :auth ] || @auth )
# Commented out vs. original
# result = conn.bind(args[:auth] || @auth)
# return result unless result.result_code == Net::LDAP::ResultCodeSuccess
yield conn
ensure
conn . close if conn
end
end
end
yield ldap
2020-04-15 10:32:17 -05:00
end
2022-12-30 16:07:08 -06:00
# Get the naming contexts for the target LDAP server.
#
# @param ldap [Net::LDAP] The Net::LDAP connection handle for the
# current LDAP connection.
# @return [Net::BER::BerIdentifiedArray] Array of naming contexts for the target LDAP server.
2020-07-25 00:13:12 +02:00
def get_naming_contexts ( ldap )
vprint_status ( " #{ peer } Getting root DSE " )
2020-04-15 10:32:17 -05:00
2020-07-25 00:13:12 +02:00
unless ( root_dse = ldap . search_root_dse )
print_error ( " #{ peer } Could not retrieve root DSE " )
return
end
naming_contexts = root_dse [ :namingcontexts ]
2020-04-16 07:00:08 -05:00
2020-07-25 00:13:12 +02:00
# NOTE: Net::LDAP converts attribute names to lowercase
if naming_contexts . empty?
print_error ( " #{ peer } Empty namingContexts attribute " )
return
end
naming_contexts
2020-04-15 10:32:17 -05:00
end
2022-12-30 16:07:08 -06:00
# Discover the base DN of the target LDAP server via the LDAP
2023-01-04 11:09:23 -06:00
# server's naming contexts.
2022-12-30 16:07:08 -06:00
#
# @param ldap [Net::LDAP] The Net::LDAP connection handle for the
# current LDAP connection.
# @return [String] A string containing the base DN of the target LDAP server.
2020-07-25 00:13:12 +02:00
def discover_base_dn ( ldap )
2022-12-30 16:07:08 -06:00
# @type [Net::BER::BerIdentifiedArray]
2020-07-25 00:13:12 +02:00
naming_contexts = get_naming_contexts ( ldap )
2020-04-15 10:32:17 -05:00
2020-07-25 00:13:12 +02:00
unless naming_contexts
print_error ( " #{ peer } Base DN cannot be determined " )
return
end
2020-04-15 10:32:17 -05:00
2023-01-24 11:23:28 -06:00
# NOTE: Find the first entry that starts with `DC=` as this will likely be the base DN.
2023-07-18 22:48:00 +01:00
naming_contexts . select! { | context | context =~ / ^([Dd][Cc]=[A-Za-z0-9-]+,?)+$ / }
2023-02-24 13:50:04 -06:00
naming_contexts . reject! { | context | context =~ / (Configuration)|(Schema)|(ForestDnsZones) / }
2023-01-24 11:23:28 -06:00
if naming_contexts . blank?
print_error ( " #{ peer } A base DN matching the expected format could not be found! " )
return
end
base_dn = naming_contexts [ 0 ]
2020-07-25 00:13:12 +02:00
print_good ( " #{ peer } Discovered base DN: #{ base_dn } " )
base_dn
end
2022-10-24 13:58:27 -04:00
2022-12-30 16:07:08 -06:00
# Check whether it was possible to successfully bind to the target LDAP
2023-01-04 11:09:23 -06:00
# server. Raise a RuntimeException with an appropriate error message
# if not.
2022-12-30 16:07:08 -06:00
#
# @param ldap [Net::LDAP] The Net::LDAP connection handle for the
# current LDAP connection.
#
# @raise [RuntimeError] A RuntimeError will be raised if the LDAP
# bind request failed.
2023-01-04 11:09:23 -06:00
# @return [Nil] This function does not return any data.
2022-10-24 13:58:27 -04:00
def validate_bind_success! ( ldap )
2023-02-24 13:50:04 -06:00
bind_result = ldap . get_operation_result . table
2022-10-24 13:58:27 -04:00
# Codes taken from https://ldap.com/ldap-result-code-reference-core-ldapv3-result-codes
2023-02-24 13:50:04 -06:00
case bind_result [ :code ]
2022-10-24 13:58:27 -04:00
when 0
2022-10-08 01:28:35 -05:00
vprint_good ( 'Successfully bound to the LDAP server!' )
2022-10-24 13:58:27 -04:00
when 1
2023-02-24 13:50:04 -06:00
fail_with ( Msf :: Module :: Failure :: NoAccess , " An operational error occurred, perhaps due to lack of authorization. The error was: #{ bind_result [ :error_message ] . strip } " )
2022-10-24 13:58:27 -04:00
when 7
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: NoTarget , 'Target does not support the simple authentication mechanism!' )
2022-10-24 13:58:27 -04:00
when 8
2023-02-24 13:50:04 -06:00
fail_with ( Msf :: Module :: Failure :: NoTarget , " Server requires a stronger form of authentication than we can provide! The error was: #{ bind_result [ :error_message ] . strip } " )
2022-10-24 13:58:27 -04:00
when 14
2023-02-24 13:50:04 -06:00
fail_with ( Msf :: Module :: Failure :: NoTarget , " Server requires additional information to complete the bind. Error was: #{ bind_result [ :error_message ] . strip } " )
2022-10-24 13:58:27 -04:00
when 48
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: NoAccess , " Target doesn't support the requested authentication type we sent. Try binding to the same user without a password, or providing credentials if you were doing anonymous authentication. " )
2022-10-24 13:58:27 -04:00
when 49
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: NoAccess , 'Invalid credentials provided!' )
2022-10-24 13:58:27 -04:00
else
2023-02-24 13:50:04 -06:00
fail_with ( Msf :: Module :: Failure :: Unknown , " Unknown error occurred whilst binding: #{ bind_result [ :error_message ] . strip } " )
2022-10-24 13:58:27 -04:00
end
end
2022-10-08 01:28:35 -05:00
2022-12-30 16:07:08 -06:00
# Validate the query result and check whether the query succeeded.
2023-01-04 11:09:23 -06:00
# Fail with an appropriate error code if the query failed.
2022-12-30 16:07:08 -06:00
#
# @param query_result [Hash] A hash containing the results of the query
2023-02-24 13:50:04 -06:00
# as a 'extended_response' representing the extended response,
# a 'code' with an integer representing the result code,
# a 'error_message' containing an optional error message as a Net::BER::BerIdentifiedString,
# a 'matched_dn' containing the matched DN,
# and a 'message' containing the query result message.
2022-12-30 16:07:08 -06:00
# @param filter [Net::LDAP::Filter] A Net::LDAP::Filter to use to
# filter the results of the query.
#
2023-01-04 11:09:23 -06:00
# @raise [RuntimeError, ArgumentError] A RuntimeError will be raised if the LDAP
# request failed. Alternatively, if the query_result parameter isn't a hash, then an
# ArgumentError will be raised.
# @return [Nil] This function does not return any data.
2023-04-28 10:09:37 -04:00
def validate_query_result! ( query_result , filter = nil )
2022-10-08 01:28:35 -05:00
if query_result . class != Hash
2023-02-24 13:50:04 -06:00
raise ArgumentError , 'Parameter to "validate_query_result!" function was not a Hash!'
2022-10-08 01:28:35 -05:00
end
2022-10-28 14:16:49 -05:00
# Codes taken from https://ldap.com/ldap-result-code-reference-core-ldapv3-result-codes
2023-02-24 13:50:04 -06:00
case query_result [ :code ]
2022-10-08 01:28:35 -05:00
when 0
2023-04-28 10:09:37 -04:00
vprint_status ( " Successfully queried #{ filter } . " ) if filter . present?
2022-10-08 01:28:35 -05:00
when 1
2022-10-28 14:16:49 -05:00
# This is unknown as whilst we could fail on lack of authorization, this is not guaranteed with this error code.
# The user will need to inspect the error message to determine the root cause of the issue.
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: Unknown , " An LDAP operational error occurred. It is likely the client requires authorization! The error was: #{ query_result [ :error_message ] . strip } " )
2022-10-28 14:16:49 -05:00
when 2
2023-02-24 13:50:04 -06:00
fail_with ( Msf :: Module :: Failure :: BadConfig , " The LDAP protocol being used by Metasploit isn't supported. The error was #{ query_result [ :error_message ] . strip } " )
2022-10-28 14:16:49 -05:00
when 3
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: TimeoutExpired , 'The LDAP server returned a timeout response to the query.' )
2022-10-28 14:16:49 -05:00
when 4
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP query was determined to result in too many entries for the LDAP server to return.' )
2022-10-28 14:16:49 -05:00
when 11
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP server indicated some administrative limit within the server whilst the request was being processed.' )
2022-10-28 14:16:49 -05:00
when 16
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: NotFound , 'The LDAP operation failed because the referenced attribute does not exist.' )
2022-10-28 14:16:49 -05:00
when 18
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: BadConfig , 'The LDAP search failed because some matching is not supported for the target attribute type!' )
2022-10-28 14:16:49 -05:00
when 32
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP search failed because the operation targeted an entity within the base DN that does not exist.' )
2022-10-28 14:16:49 -05:00
when 33
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: BadConfig , " An attempt was made to dereference an alias that didn't resolve properly. " )
2022-10-28 14:16:49 -05:00
when 34
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: BadConfig , 'The request included an invalid base DN entry.' )
2022-10-28 14:16:49 -05:00
when 50
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: NoAccess , 'The LDAP operation failed due to insufficient access rights.' )
2022-10-28 14:16:49 -05:00
when 51
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP operation failed because the server is too busy to perform the request.' )
2022-10-28 14:16:49 -05:00
when 52
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP operation failed because the server is not currently available to process the request.' )
2022-10-28 14:16:49 -05:00
when 53
2023-01-17 14:27:16 -05:00
fail_with ( Msf :: Module :: Failure :: UnexpectedReply , 'The LDAP operation failed because the server is unwilling to perform the request.' )
2022-10-28 14:16:49 -05:00
when 64
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: Unknown , 'The LDAP operation failed due to a naming violation.' )
2022-10-28 14:16:49 -05:00
when 65
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: Unknown , 'The LDAP operation failed due to an object class violation.' )
2022-10-08 01:28:35 -05:00
else
2023-02-24 13:50:04 -06:00
if query_result [ :error_message ] . blank?
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: Unknown , 'The LDAP operation failed but no error message was returned!' )
2022-10-08 01:28:35 -05:00
else
2023-04-28 10:09:37 -04:00
fail_with ( Msf :: Module :: Failure :: Unknown , " The LDAP operation failed with error: #{ query_result [ :error_message ] . strip } " )
2022-10-08 01:28:35 -05:00
end
end
end
2020-07-25 00:13:12 +02:00
end
2020-04-15 04:51:39 -05:00
end