2011-11-21 20:37:26 +00:00
|
|
|
require "rex/parser/nokogiri_doc_mixin"
|
2011-06-01 00:01:46 +00:00
|
|
|
|
|
|
|
module Rex
|
|
|
|
module Parser
|
|
|
|
|
|
|
|
# If Nokogiri is available, define Template document class.
|
|
|
|
load_nokogiri && class MbsaDocument < Nokogiri::XML::SAX::Document
|
|
|
|
|
|
|
|
include NokogiriDocMixin
|
|
|
|
|
|
|
|
# Triggered every time a new element is encountered. We keep state
|
|
|
|
# ourselves with the @state variable, turning things on when we
|
|
|
|
# get here (and turning things off when we exit in end_element()).
|
|
|
|
def start_element(name=nil,attrs=[])
|
|
|
|
attrs = normalize_attrs(attrs)
|
|
|
|
block = @block
|
|
|
|
@state[:current_tag][name] = true
|
|
|
|
case name
|
|
|
|
when "SecScan"
|
|
|
|
record_host(attrs)
|
|
|
|
when "IP" # TODO: Check to see if IPList/IP is useful to import
|
|
|
|
when "Check" # A list of MBSA checks. They have an ID and a Name.
|
|
|
|
record_check(attrs)
|
|
|
|
when "Advice" # Check advice. Free form text about the check
|
|
|
|
@state[:has_text] = true
|
|
|
|
when "Detail" # Check/Detail is where missing fixes are.
|
|
|
|
record_detail(attrs)
|
|
|
|
when "UpdateData" # Info about installed/missing hotfixes
|
|
|
|
record_updatedata(attrs)
|
|
|
|
when "Title" # MSB Title
|
|
|
|
@state[:has_text] = true
|
|
|
|
when "InformationURL" # Only use this if we don't have a Bulletin ID
|
|
|
|
@state[:has_text] = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# This breaks xml-encoded characters, so need to append
|
|
|
|
def characters(text)
|
|
|
|
return unless @state[:has_text]
|
|
|
|
@text ||= ""
|
|
|
|
@text << text
|
|
|
|
end
|
|
|
|
|
|
|
|
# When we exit a tag, this is triggered.
|
|
|
|
def end_element(name=nil)
|
|
|
|
block = @block
|
|
|
|
case name
|
|
|
|
when "SecScan" # Wrap it up
|
|
|
|
collect_host_data
|
|
|
|
host_object = report_host &block
|
2011-06-01 02:21:10 +00:00
|
|
|
if host_object
|
|
|
|
db.report_import_note(@args[:wspace],host_object)
|
|
|
|
report_fingerprint(host_object)
|
|
|
|
report_vulns(host_object,&block)
|
|
|
|
end
|
2011-06-01 00:01:46 +00:00
|
|
|
# Reset the state once we close a host
|
|
|
|
@state.delete_if {|k| k != :current_tag}
|
|
|
|
when "Check"
|
|
|
|
collect_check_data
|
|
|
|
when "Advice"
|
|
|
|
@state[:has_text] = false
|
|
|
|
collect_advice_data
|
|
|
|
when "Detail"
|
|
|
|
collect_detail_data
|
|
|
|
when "UpdateData"
|
|
|
|
collect_updatedata
|
|
|
|
when "Title"
|
|
|
|
@state[:has_text] = false
|
|
|
|
collect_title
|
|
|
|
when "InformationURL"
|
|
|
|
collect_url
|
|
|
|
@state[:has_text] = false
|
|
|
|
end
|
|
|
|
@state[:current_tag].delete name
|
|
|
|
end
|
|
|
|
|
|
|
|
def report_fingerprint(host_object)
|
|
|
|
return unless host_object.kind_of? Msf::DBManager::Host
|
|
|
|
return unless @report_data[:os_fingerprint]
|
|
|
|
fp_note = @report_data[:os_fingerprint].merge(
|
|
|
|
{
|
|
|
|
:workspace => host_object.workspace,
|
|
|
|
:host => host_object
|
|
|
|
})
|
|
|
|
db_report(:note, fp_note)
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_url
|
|
|
|
return unless in_tag("References")
|
|
|
|
return unless in_tag("UpdateData")
|
|
|
|
return unless in_tag("Detail")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
@state[:update][:url] = @text.to_s.strip
|
|
|
|
@text = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def report_vulns(host_object, &block)
|
|
|
|
return unless host_object.kind_of? Msf::DBManager::Host
|
|
|
|
return unless @report_data[:vulns]
|
|
|
|
return if @report_data[:vulns].empty?
|
|
|
|
@report_data[:vulns].each do |vuln|
|
|
|
|
next unless vuln[:refs]
|
|
|
|
if vuln[:refs].empty?
|
|
|
|
next
|
|
|
|
end
|
|
|
|
if block
|
|
|
|
db.emit(:vuln, ["Missing #{vuln[:name]}",1], &block) if block
|
|
|
|
end
|
|
|
|
db_report(:vuln, vuln.merge(:host => host_object))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_title
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
collect_bulletin_title
|
|
|
|
@text = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_bulletin_title
|
|
|
|
return unless @state[:check_state]["ID"] == 500.to_s
|
|
|
|
return unless in_tag("UpdateData")
|
|
|
|
return unless @state[:update]
|
|
|
|
return if @text.to_s.strip.empty?
|
|
|
|
@state[:update]["Title"] = @text.to_s.strip
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_updatedata
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
return unless in_tag("Detail")
|
|
|
|
collect_missing_update
|
|
|
|
@state[:updates] = {}
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_missing_update
|
|
|
|
return unless @state[:check_state]["ID"] == 500.to_s
|
|
|
|
return if @state[:update]["IsInstalled"] == "true"
|
|
|
|
@report_data[:missing_updates] ||= []
|
|
|
|
this_update = {}
|
|
|
|
this_update[:name] = @state[:update]["Title"].to_s.strip
|
|
|
|
this_update[:refs] = []
|
|
|
|
if @state[:update]["BulletinID"].empty?
|
|
|
|
this_update[:refs] << "URL-#{@state[:update][:url]}"
|
|
|
|
else
|
|
|
|
this_update[:refs] << "MSB-#{@state[:update]["BulletinID"]}"
|
|
|
|
end
|
|
|
|
@report_data[:missing_updates] << this_update
|
|
|
|
end
|
|
|
|
|
|
|
|
# So far, just care about Host OS
|
|
|
|
# There is assuredly more interesting things going on in here.
|
|
|
|
def collect_advice_data
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
collect_os_name
|
|
|
|
@text = nil
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_os_name
|
|
|
|
return unless @state[:check_state]["ID"] == 10101.to_s
|
|
|
|
return unless @text
|
|
|
|
return if @text.strip.empty?
|
|
|
|
os_match = @text.match(/Computer is running (.*)/)
|
|
|
|
return unless os_match
|
|
|
|
os_info = os_match[1]
|
|
|
|
os_vendor = os_info[/Microsoft/]
|
|
|
|
os_family = os_info[/Windows/]
|
2011-06-01 16:31:27 +00:00
|
|
|
os_version = os_info[/(XP|2000 Advanced Server|2000|2003|2008|SBS|Vista|7 .* Edition|7)/]
|
2011-06-01 00:01:46 +00:00
|
|
|
if os_info
|
|
|
|
@report_data[:os_fingerprint] = {}
|
|
|
|
@report_data[:os_fingerprint][:type] = "host.os.mbsa_fingerprint"
|
|
|
|
@report_data[:os_fingerprint][:data] = {
|
|
|
|
:os_vendor => os_vendor,
|
|
|
|
:os_family => os_family,
|
|
|
|
:os_version => os_version,
|
|
|
|
:os_accuracy => 100,
|
|
|
|
:os_match => os_info.gsub(/\x2e$/,"")
|
|
|
|
}
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_detail_data
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
if @report_data[:missing_updates]
|
|
|
|
@report_data[:vulns] = @report_data[:missing_updates]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_check_data
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
@state[:check_state] = {}
|
|
|
|
end
|
|
|
|
|
|
|
|
def collect_host_data
|
|
|
|
return unless @state[:address]
|
|
|
|
return if @state[:address].strip.empty?
|
|
|
|
@report_data[:host] = @state[:address].strip
|
|
|
|
if @state[:hostname] && !@state[:hostname].empty?
|
|
|
|
@report_data[:name] = @state[:hostname]
|
|
|
|
end
|
|
|
|
@report_data[:state] = Msf::HostState::Alive
|
|
|
|
end
|
|
|
|
|
|
|
|
def report_host(&block)
|
|
|
|
if host_is_okay
|
|
|
|
db.emit(:address,@report_data[:host],&block) if block
|
|
|
|
host_info = @report_data.merge(:workspace => @args[:wspace])
|
|
|
|
db_report(:host, host_info)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_updatedata(attrs)
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
return unless in_tag("Detail")
|
|
|
|
update_attrs = attr_hash(attrs)
|
|
|
|
@state[:update] = attr_hash(attrs)
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_host(attrs)
|
|
|
|
host_attrs = attr_hash(attrs)
|
|
|
|
@state[:address] = host_attrs["IP"]
|
|
|
|
@state[:hostname] = host_attrs["Machine"]
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_check(attrs)
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
@state[:check_state] = attr_hash(attrs)
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_detail(attrs)
|
|
|
|
return unless in_tag("SecScan")
|
|
|
|
return unless in_tag("Check")
|
|
|
|
@state[:detail_state] = attr_hash(attrs)
|
|
|
|
end
|
|
|
|
|
|
|
|
# We need to override the usual host_is_okay because MBSA apparently
|
|
|
|
# doesn't report on open ports at all.
|
|
|
|
def host_is_okay
|
|
|
|
return false unless @report_data[:host]
|
|
|
|
return false unless valid_ip(@report_data[:host])
|
|
|
|
return false unless @report_data[:state] == Msf::HostState::Alive
|
|
|
|
if @args[:blacklist]
|
|
|
|
return false if @args[:blacklist].include?(@report_data[:host])
|
|
|
|
end
|
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|