Files
metasploit-gs/modules/auxiliary/scanner/rsync/modules_list.rb
T

228 lines
6.6 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
RSYNC_HEADER = '@RSYNCD:'
2015-11-06 12:25:27 -08:00
HANDLED_EXCEPTIONS = [
Rex::AddressInUse, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused,
::Errno::ETIMEDOUT, ::Timeout::Error, ::EOFError
]
def initialize
super(
'Name' => 'List Rsync Modules',
'Description' => %q(
An rsync module is essentially a directory share. These modules can
optionally be protected by a password. This module connects to and
negotiates with an rsync server, lists the available modules and,
optionally, determines if the module requires a password to access.
),
'Author' => [
'ikkini', # original metasploit module
'Jon Hart <jon_hart[at]rapid7.com>', # improved metasploit module
'Nixawk' # improved metasploit module
],
2014-08-28 18:47:56 -05:00
'References' =>
[
['URL', 'http://rsync.samba.org/ftp/rsync/rsync.html']
],
'License' => MSF_LICENSE
)
register_options(
[
OptBool.new('TEST_AUTHENTICATION',
[ true, 'Test if the rsync module requires authentication', true ]),
2014-08-28 18:40:55 -05:00
Opt::RPORT(873)
]
)
register_advanced_options(
[
2015-11-04 10:11:00 -08:00
OptBool.new('SHOW_MOTD',
[ true, 'Show the rsync motd, if found', false ]),
2015-11-06 10:03:06 -08:00
OptBool.new('SHOW_VERSION',
[ true, 'Show the rsync version', false ]),
OptInt.new('READ_TIMEOUT', [ true, 'Seconds to wait while reading rsync responses', 2 ])
]
)
end
2015-10-12 13:03:55 -07:00
def read_timeout
datastore['READ_TIMEOUT']
2015-10-12 13:03:55 -07:00
end
2015-11-06 09:50:39 -08:00
def get_rsync_auth_status(rmodule)
sock.puts("#{rmodule}\n")
res = sock.get_once(-1, read_timeout)
if res
2015-11-06 09:50:39 -08:00
res.strip!
if res =~ /^#{RSYNC_HEADER} AUTHREQD \S+$/
2015-11-06 08:34:17 -08:00
'required'
2015-11-06 09:50:39 -08:00
elsif res =~ /^#{RSYNC_HEADER} OK$/
2015-11-06 08:34:17 -08:00
'not required'
else
2016-02-01 16:06:34 -06:00
vprint_error("unexpected response when connecting to #{rmodule}: #{res}")
2015-11-06 09:50:39 -08:00
"unexpected response '#{res}'"
end
else
2016-02-01 16:06:34 -06:00
vprint_error("no response when connecting to #{rmodule}")
2015-11-06 08:34:17 -08:00
'no response'
end
end
2015-10-12 11:19:31 -07:00
def rsync_list
sock.puts("#list\n")
2015-11-04 09:11:07 -08:00
modules_metadata = []
2015-10-12 11:19:31 -07:00
# the module listing is the module name and comment separated by a tab, each module
# on its own line, lines separated with a newline
2015-10-12 13:03:55 -07:00
sock.get(read_timeout).split(/\n/).map(&:strip).map do |module_line|
2015-11-04 09:12:02 -08:00
break if module_line =~ /^#{RSYNC_HEADER} EXIT$/
2015-11-02 09:14:41 -08:00
name, comment = module_line.split(/\t/).map(&:strip)
next unless name
2015-11-04 09:11:07 -08:00
modules_metadata << { name: name, comment: comment }
2015-10-12 11:19:31 -07:00
end
2015-10-12 13:03:55 -07:00
2015-11-04 09:11:07 -08:00
modules_metadata
2015-10-12 11:19:31 -07:00
end
2015-11-02 10:49:48 -08:00
# Attempts to negotiate the rsync protocol with the endpoint.
def rsync_negotiate
2015-10-30 13:13:44 -07:00
# rsync is promiscuous and will send the negotitation and motd
# upon connecting. abort if we get nothing
return unless (greeting = sock.get_once(-1, read_timeout))
2014-08-28 18:40:55 -05:00
# parse the greeting control and data lines. With some systems, the data
# lines at this point will be the motd.
greeting_control_lines, greeting_data_lines = rsync_parse_lines(greeting)
2015-10-12 13:03:55 -07:00
2015-10-30 13:13:44 -07:00
# locate the rsync negotiation and complete it by just echo'ing
# back the same rsync version that it sent us
version = nil
greeting_control_lines.map do |greeting_control_line|
if /^#{RSYNC_HEADER} (?<version>\d+(\.\d+)?)$/ =~ greeting_control_line
version = Regexp.last_match('version')
sock.puts("#{RSYNC_HEADER} #{version}\n")
2015-10-12 13:03:55 -07:00
end
end
2015-10-30 13:13:44 -07:00
unless version
2016-02-01 16:06:34 -06:00
vprint_error("no rsync negotiation found")
2015-10-30 13:13:44 -07:00
return
end
_, post_neg_data_lines = rsync_parse_lines(sock.get_once(-1, read_timeout))
motd_lines = greeting_data_lines + post_neg_data_lines
2015-11-02 09:18:10 -08:00
[ version, motd_lines.empty? ? nil : motd_lines.join("\n") ]
end
# parses the control and data lines from the provided response data
def rsync_parse_lines(response_data)
control_lines = []
data_lines = []
if response_data
response_data.strip!
response_data.split(/\n/).map do |line|
if line =~ /^#{RSYNC_HEADER}/
control_lines << line
else
data_lines << line
end
end
end
[ control_lines, data_lines ]
2015-10-12 11:19:31 -07:00
end
def run_host(ip)
2015-11-06 09:44:05 -08:00
begin
connect
version, motd = rsync_negotiate
unless version
2016-02-01 16:06:34 -06:00
vprint_error("does not appear to be rsync")
2015-11-06 09:44:05 -08:00
disconnect
return
end
2015-11-06 12:25:27 -08:00
rescue *HANDLED_EXCEPTIONS => e
2016-02-01 16:06:34 -06:00
vprint_error("error while connecting and negotiating: #{e}")
2015-10-12 11:19:31 -07:00
disconnect
return
end
2014-10-19 00:29:36 +02:00
2015-10-12 13:03:55 -07:00
info = "rsync protocol version #{version}"
info += ", MOTD '#{motd}'" if motd
2015-10-12 10:56:21 -07:00
report_service(
2015-10-12 09:05:01 -07:00
host: ip,
port: rport,
2015-10-12 10:56:21 -07:00
proto: 'tcp',
name: 'rsync',
2015-10-12 13:03:55 -07:00
info: info
2014-08-28 18:40:55 -05:00
)
2016-02-01 16:06:34 -06:00
print_status("rsync version: #{version}") if datastore['SHOW_VERSION']
print_status("rsync MOTD: #{motd}") if motd && datastore['SHOW_MOTD']
2014-08-28 18:40:55 -05:00
2015-11-06 09:44:05 -08:00
modules_metadata = {}
begin
modules_metadata = rsync_list
2015-11-06 12:25:27 -08:00
rescue *HANDLED_EXCEPTIONS => e
vprint_error("Error while listing modules: #{e}")
2015-11-06 09:44:05 -08:00
return
ensure
disconnect
end
2015-11-04 09:11:07 -08:00
if modules_metadata.empty?
2016-02-01 16:06:34 -06:00
print_status("no rsync modules found")
else
2015-11-04 09:11:07 -08:00
modules = modules_metadata.map { |m| m[:name] }
2016-02-01 16:06:34 -06:00
print_good("#{modules.size} rsync modules found: #{modules.join(', ')}")
table_columns = %w(Name Comment)
if datastore['TEST_AUTHENTICATION']
2015-11-06 09:50:39 -08:00
table_columns << 'Authentication'
2015-11-04 09:11:07 -08:00
modules_metadata.each do |module_metadata|
2015-11-06 09:44:05 -08:00
begin
connect
rsync_negotiate
2015-11-06 09:50:39 -08:00
module_metadata[:authentication] = get_rsync_auth_status(module_metadata[:name])
2015-11-06 12:25:27 -08:00
rescue *HANDLED_EXCEPTIONS => e
2016-02-01 16:06:34 -06:00
vprint_error("error while testing authentication on #{module_metadata[:name]}: #{e}")
2015-11-06 12:25:27 -08:00
break
2015-11-06 09:44:05 -08:00
ensure
disconnect
end
end
end
# build a table to store the module listing in
listing_table = Msf::Ui::Console::Table.new(
Msf::Ui::Console::Table::Style::Default,
2015-11-04 09:05:33 -08:00
'Header' => "rsync modules for #{peer}",
'Columns' => table_columns,
2015-11-04 09:11:07 -08:00
'Rows' => modules_metadata.map(&:values)
2015-10-12 11:19:31 -07:00
)
vprint_line(listing_table.to_s)
report_note(
host: ip,
proto: 'tcp',
port: rport,
2015-10-12 10:56:21 -07:00
type: 'rsync_modules',
2015-11-04 09:11:07 -08:00
data: { modules: modules_metadata }
)
end
end
def setup
fail_with(Failure::BadConfig, 'READ_TIMEOUT must be > 0') if read_timeout <= 0
end
end