159 lines
3.1 KiB
Ruby
159 lines
3.1 KiB
Ruby
|
##
|
||
|
# $Id$
|
||
|
##
|
||
|
|
||
|
##
|
||
|
# This file is part of the Metasploit Framework and may be subject to
|
||
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||
|
# Framework web site for more information on licensing and terms of use.
|
||
|
# http://metasploit.com/framework/
|
||
|
##
|
||
|
|
||
|
|
||
|
require 'msf/core'
|
||
|
|
||
|
|
||
|
class Metasploit3 < Msf::Auxiliary
|
||
|
|
||
|
include Msf::Exploit::Remote::WDBRPC
|
||
|
include Msf::Auxiliary::Report
|
||
|
include Msf::Auxiliary::Scanner
|
||
|
|
||
|
def initialize
|
||
|
super(
|
||
|
'Name' => 'VxWorks WDB Agent Version Scanner',
|
||
|
'Version' => '$Revision$',
|
||
|
'Description' => 'Scan for exposed VxWorks wdbrpc daemons',
|
||
|
'Author' => 'hdm',
|
||
|
'License' => MSF_LICENSE,
|
||
|
'References' =>
|
||
|
[
|
||
|
['URL', 'http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html'],
|
||
|
['URL', 'http://www.kb.cert.org/vuls/id/362332']
|
||
|
]
|
||
|
)
|
||
|
|
||
|
register_options(
|
||
|
[
|
||
|
OptInt.new('BATCHSIZE', [true, 'The number of hosts to probe in each set', 256]),
|
||
|
Opt::RPORT(17185)
|
||
|
], self.class)
|
||
|
end
|
||
|
|
||
|
|
||
|
# Define our batch size
|
||
|
def run_batch_size
|
||
|
datastore['BATCHSIZE'].to_i
|
||
|
end
|
||
|
|
||
|
# Operate on an entire batch of hosts at once
|
||
|
def run_batch(batch)
|
||
|
|
||
|
begin
|
||
|
udp_sock = nil
|
||
|
idx = 0
|
||
|
|
||
|
udp_sock = Rex::Socket::Udp.create(
|
||
|
{
|
||
|
'Context' => {'Msf' => framework, 'MsfExploit' => self}
|
||
|
}
|
||
|
)
|
||
|
add_socket(udp_sock)
|
||
|
|
||
|
batch.each do |ip|
|
||
|
|
||
|
begin
|
||
|
udp_sock.sendto(create_probe(ip), ip, datastore['RPORT'].to_i, 0)
|
||
|
rescue ::Interrupt
|
||
|
raise $!
|
||
|
rescue ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionRefused
|
||
|
nil
|
||
|
end
|
||
|
|
||
|
if (idx % 10 == 0)
|
||
|
while (r = udp_sock.recvfrom(65535, 0.01) and r[1])
|
||
|
parse_reply(r)
|
||
|
end
|
||
|
end
|
||
|
|
||
|
idx += 1
|
||
|
end
|
||
|
|
||
|
cnt = 0
|
||
|
del = 10
|
||
|
sts = Time.now.to_i
|
||
|
while (r = udp_sock.recvfrom(65535, del) and r[1])
|
||
|
parse_reply(r)
|
||
|
|
||
|
# Prevent an indefinite loop if the targets keep replying
|
||
|
cnt += 1
|
||
|
break if cnt > run_batch_size
|
||
|
|
||
|
# Escape after 15 seconds regardless of batch size
|
||
|
break if ((sts + 15) < Time.now.to_i)
|
||
|
|
||
|
del = 1.0
|
||
|
end
|
||
|
|
||
|
rescue ::Interrupt
|
||
|
raise $!
|
||
|
rescue ::Exception => e
|
||
|
print_status("Unknown error: #{e.class} #{e}")
|
||
|
ensure
|
||
|
udp_sock.close if udp_sock
|
||
|
end
|
||
|
end
|
||
|
|
||
|
#
|
||
|
# The response parsers
|
||
|
#
|
||
|
def parse_reply(pkt)
|
||
|
|
||
|
return if not pkt[1]
|
||
|
|
||
|
if(pkt[1] =~ /^::ffff:/)
|
||
|
pkt[1] = pkt[1].sub(/^::ffff:/, '')
|
||
|
end
|
||
|
|
||
|
data = pkt[0]
|
||
|
|
||
|
# Bare RPC response
|
||
|
if data.length == 24
|
||
|
ecode = data[20,4].unpack("N")[0]
|
||
|
emesg = "unknown"
|
||
|
case ecode
|
||
|
when 3
|
||
|
# Should not be hit
|
||
|
emesg = "Device requires the VxWorks 5 WDB protocol"
|
||
|
when 5
|
||
|
emesg = "Device failed to parse the probe"
|
||
|
end
|
||
|
|
||
|
print_status("#{pkt[1]} Error: code=#{ecode} #{emesg}")
|
||
|
return
|
||
|
end
|
||
|
|
||
|
if data.length < 80
|
||
|
print_status("#{pkt[1]}: Unknown response #{data.unpack("H*")[0]}")
|
||
|
return
|
||
|
end
|
||
|
|
||
|
res = wdbrpc_parse_connect_reply(data)
|
||
|
print_status("#{pkt[1]}: #{res[:rt_vers]} #{res[:rt_bsp_name]} #{res[:rt_bootline]}")
|
||
|
|
||
|
report_note(
|
||
|
:host => pkt[1],
|
||
|
:port => datastore['RPORT'],
|
||
|
:proto => 'udp',
|
||
|
:type => 'vxworks.target_info',
|
||
|
:data => res,
|
||
|
:update => :unique
|
||
|
)
|
||
|
end
|
||
|
|
||
|
def create_probe(ip)
|
||
|
wdbrpc_request_connect(ip)
|
||
|
end
|
||
|
end
|
||
|
|