metasploit-framework/modules/auxiliary/gather/ibm_sametime_version.rb

328 lines
9.4 KiB
Ruby
Raw Normal View History

2013-12-26 12:00:39 +00:00
##
# This module requires Metasploit: http://metasploit.com/download
2013-12-26 12:00:39 +00:00
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'uri'
2016-03-08 13:02:44 +00:00
class MetasploitModule < Msf::Auxiliary
2013-12-26 12:00:39 +00:00
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report
2014-01-17 18:23:11 +00:00
URLS = [
'/stmeetings/about.jsp',
'/stmeetings/serverversion.properties',
'/rtc/buildinfo.txt',
'/stmeetings/configuration?format=json&verbose=true'
]
PROXY_URLS = [
'/stwebclient/i18nStrings.jsp',
'/stwebclient/communityserver',
'/stwebav/WebAVServlet?Name=WebPlayerVersion'
]
JSON_KEYS = [
'communityRef',
'anonymousEnabled',
'calinteg.enabled',
'docshare.fileio.codebase',
'docshare.native.codebase',
'docshare.remote.url',
'meetingroom.allowGuestAccess',
'meetingroomcenter.allowGuestAccess',
'meetingroomcenter.customLoginPage',
'meetingroomcenter.enforceCSRFToken',
'meetingroomcenter.enforceHiddenRooms',
'meetingroomcenter.passwords',
'meetingserver.statistics.jmx.enabled',
'rtc4web.enforceNonce',
'userInfoRedirect',
'userInfoUrlTemplate',
'meetingroomcenter.stProxyAddress',
'meetingroomcenter.stProxySSLAddress'
]
INFO_REGEXS = [
# section, key, regex
[ 'version', 'sametimeVersion', /lotusBuild">Release (.+?)<\/td>/i ],
[ 'api', 'meeting', /^meeting=(.*)$/i ],
[ 'api', 'appshare', /^appshare=(.*)$/i ],
[ 'api', 'docshare', /^docshare=(.*)$/i ],
[ 'api', 'rtc4web', /^rtc4web=(.*)$/i ],
[ 'api', 'roomapi', /^roomapi=(.*)$/i ],
[ 'api', 'recordings', /^recordings=(.*)$/i ],
[ 'api', 'audio', /^audio=(.*)$/i ],
[ 'api', 'video', /^video=(.*)$/i]
]
2014-01-17 21:31:51 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'IBM Lotus Sametime Version Enumeration',
'Description' => %q{
2014-01-17 18:23:11 +00:00
This module scans an IBM Lotus Sametime web interface to enumerate
the application's version and configuration information.
},
2014-01-17 21:31:51 +00:00
'Author' =>
[
'kicks4kittens' # Metasploit module
],
2014-05-22 16:34:04 +00:00
'References' =>
[
[ 'CVE', '2013-3982' ],
[ 'URL', 'http://www-01.ibm.com/support/docview.wss?uid=swg21671201']
],
2014-02-05 20:54:02 +00:00
'DefaultOptions' =>
{
'SSL' => true
},
2014-01-17 21:31:51 +00:00
'License' => MSF_LICENSE,
'DisclosureDate' => 'Dec 27 2013'
))
2014-01-17 23:59:03 +00:00
register_options(
[
2014-02-05 20:54:02 +00:00
Opt::RPORT(443),
OptString.new('TARGETURI', [ true, "The path to the Sametime Server", '/']),
OptBool.new('QuerySametimeProxy', [ true, "Automatically query Sametime proxy if found", true]),
OptBool.new('ShowVersions', [ true, "Display Version information from server", true]),
OptBool.new('ShowConfig', [ true, "Display Config information from server", true]),
OptBool.new('ShowAPIVersions', [ true, "Display API Version information from server", false])
], self.class)
register_advanced_options(
[
OptBool.new('StoreConfigs', [ true, "Store JSON configs to loot", true])
], self.class)
end
2014-01-17 18:23:11 +00:00
def check_url(url, proxy='')
cgi_options = {
'uri' => normalize_uri(target_path, url),
'method' => 'GET'
}
2014-01-17 18:23:11 +00:00
if proxy.empty?
checked_host = datastore['RHOST']
else
2014-01-17 18:23:11 +00:00
checked_host = proxy
cgi_options.merge!({
'rhost' => proxy, # connect to Sametime Proxy
'vhost' => proxy # set appropriate VHOST
})
2013-12-26 12:00:39 +00:00
end
2014-01-17 18:23:11 +00:00
vprint_status("Requesting \"#{checked_host}:#{rport}#{normalize_uri(target_uri.path, url)}\"")
res = send_request_cgi(cgi_options)
if res.nil?
print_status("#{checked_host}:#{rport} - Did not respond")
return
elsif res.code == 403
print_status("#{checked_host}:#{rport} - Access Denied #{res.code} #{res.message}")
return
2014-01-17 18:23:11 +00:00
elsif res.code != 200
print_error("#{checked_host}:#{rport} - Unexpected Response code (#{res.code}) received from server")
return
end
2013-12-26 12:00:39 +00:00
if url.include?('WebAVServlet')
# special handler for WebAVServlet as body is JSON regardless of content-type
begin
res_json = JSON.parse(res.body)
rescue JSON::ParserError
2014-01-17 23:59:03 +00:00
print_error("#{checked_host}:#{rport} - Unable to parse JSON response")
end
extract_webavservlet_data(res_json)
elsif res['content-type'].include?("text/plain") or res['content-type'].include?("text/html")
extract_data(res.body, url)
elsif res['content-type'].include?("text/json") or res['content-type'].include?("text/javaScript")
begin
res_json = JSON.parse(res.body)
rescue JSON::ParserError
2014-01-17 23:59:03 +00:00
print_error("#{checked_host}:#{rport} - Unable to parse JSON response")
end
# store configuration files as loot
2014-01-17 18:23:11 +00:00
store_config(url, res_json, checked_host) if datastore['StoreConfigs']
extract_json_data(res_json)
end
end
2013-12-26 12:00:39 +00:00
2014-01-17 18:23:11 +00:00
# extract data from WebAVServlet
def extract_webavservlet_data(res_json)
# stwebav/WebAVServlet --> WebPlayer information
if res_json['Softphone']
@version_info['version']['Softphone'] = res_json['Softphone']
end
2014-01-17 18:23:11 +00:00
if res_json['WebPlayer']
@version_info['version']['WebPlayer'] = res_json['WebPlayer']
end
end
2014-01-17 18:23:11 +00:00
def extract_data(data, url)
# extract data from response
2014-01-17 18:23:11 +00:00
INFO_REGEXS.each do |regex|
if data =~ regex[2]
@version_info[regex[0]][regex[1]] = $1.chomp
end
2013-12-26 12:00:39 +00:00
end
2014-01-17 18:23:11 +00:00
if url.include?('buildinfo.txt') and data =~ /^(\d{8}-\d+)$/
@version_info['version']['buildinfo'] = $1.chomp
end
2014-01-17 18:23:11 +00:00
if data =~ /aboutBoxProductTitle":"(.*?)",/i
@version_info['version']['sametimeVersion'] = $1.chomp unless @version_info['version']['sametimeVersion']
2013-12-26 12:00:39 +00:00
end
2014-01-17 18:23:11 +00:00
end
2013-12-26 12:00:39 +00:00
2014-01-17 18:23:11 +00:00
# extract data from JSON response
def extract_json_data(json)
JSON_KEYS.each do |k|
@version_info['conf'][k] = json[k] if json[k]
end
end
2013-12-26 12:00:39 +00:00
def report
if @version_info['version']['sametimeVersion']
2014-01-17 18:23:11 +00:00
print_line
2016-02-01 22:06:34 +00:00
print_good("#{@version_info['version']['sametimeVersion']} Detected")
else
2014-01-17 18:23:11 +00:00
print_line
2016-02-01 22:06:34 +00:00
print_status("IBM Lotus Sametime information")
end
2013-12-26 12:00:39 +00:00
# configure tables
version_tbl = Msf::Ui::Console::Table.new(
Msf::Ui::Console::Table::Style::Default,
'Header' => "IBM Lotus Sametime Information [Version]",
'Prefix' => "",
'Indent' => 1,
'Columns' =>
[
"Component",
"Version"
])
conf_tbl = Msf::Ui::Console::Table.new(
Msf::Ui::Console::Table::Style::Default,
'Header' => "IBM Lotus Sametime Information [Config]",
'Prefix' => "",
'Indent' => 1,
'Columns' =>
[
"Key",
"Value"
])
api_tbl = Msf::Ui::Console::Table.new(
Msf::Ui::Console::Table::Style::Default,
'Header' => "IBM Lotus Sametime Information [API]",
'Prefix' => "",
'Indent' => 1,
'Columns' =>
[
"API",
"Version"
])
# populate tables
@version_info['version'].each do | line |
version_tbl << [ line[0], line[1] ]
end
2013-12-26 12:00:39 +00:00
@version_info['conf'].each do | line |
conf_tbl << [ line[0], line[1] ]
end
2013-12-26 12:00:39 +00:00
@version_info['api'].each do | line |
api_tbl << [ line[0], line[1] ]
end
2013-12-26 12:00:39 +00:00
# display tables
print_good("#{version_tbl.to_s}") if not version_tbl.to_s.empty? and datastore['ShowVersions']
print_good("#{api_tbl.to_s}") if not api_tbl.to_s.empty? and datastore['ShowAPIVersions']
print_good("#{conf_tbl.to_s}") if not conf_tbl.to_s.empty? and datastore['ShowConfig']
# report_note
2014-01-17 18:23:11 +00:00
report_note(
2014-01-17 20:49:50 +00:00
:host => rhost,
:port => rport,
2014-01-17 18:23:11 +00:00
:proto => 'http',
:ntype => 'ibm_lotus_sametime_version',
:data => @version_info['version']['sametimeVersion']
) if @version_info['version']['sametimeVersion']
end
2014-01-17 18:23:11 +00:00
def store_config(url, config_to_store, checked_host)
# store configuration as loot
2014-01-17 18:23:11 +00:00
unless config_to_store.empty?
loot = store_loot(
"ibm_lotus_sametime_configuration_" + url,
"text/json",
datastore['rhost'],
config_to_store,
".json"
)
2014-01-17 18:23:11 +00:00
print_good("#{checked_host} - IBM Lotus Sametime Configuration data stored as loot")
print_status("#{checked_host}#{normalize_uri(target_uri.path, url)}\n => #{loot}")
end
end
2014-01-17 18:23:11 +00:00
def target_path
normalize_uri(target_uri.path)
end
def proxy?
@version_info['conf']['meetingroomcenter.stProxyAddress'] or @version_info['conf']['meetingroomcenter.stProxySSLAddress']
end
2014-01-17 18:23:11 +00:00
def use_proxy?
datastore['QuerySametimeProxy']
end
def proxy_ssl?
@version_info['conf']['meetingroomcenter.stProxySSLAddress']
end
def run
# create storage for extracted information+
@version_info = {}
@version_info['version'] = {}
@version_info['conf'] = {}
@version_info['api'] = {}
2016-02-01 22:06:34 +00:00
print_status("Checking IBM Lotus Sametime Server")
2014-01-17 18:23:11 +00:00
URLS.each do | url |
check_url(url)
end
2013-12-26 12:00:39 +00:00
2014-01-17 18:23:11 +00:00
if proxy? and use_proxy?
# check Sametime proxy if configured to do so
2014-01-17 18:23:11 +00:00
if proxy_ssl? and ssl
# keep using SSL
proxy = URI(@version_info['conf']['meetingroomcenter.stProxySSLAddress']).host
else
proxy = URI(@version_info['conf']['meetingroomcenter.stProxyAddress']).host
end
2013-12-26 12:00:39 +00:00
2016-02-01 22:06:34 +00:00
print_good("Sametime Proxy address discovered #{proxy}")
2013-12-26 12:00:39 +00:00
2014-01-17 18:23:11 +00:00
PROXY_URLS.each do | url |
check_url(url, proxy)
end
2014-01-17 18:23:11 +00:00
elsif proxy?
2016-02-01 22:06:34 +00:00
print_status("Sametime Proxy address discovered, but checks disabled")
2013-12-26 12:00:39 +00:00
end
report unless @version_info.empty?
end
2013-12-26 12:00:39 +00:00
end