2018-08-01 06:29:39 +00:00
#!/usr/bin/env ruby
require 'fileutils'
2019-01-16 23:01:09 +00:00
require 'io/console'
2018-08-01 06:29:39 +00:00
require 'json'
require 'net/http'
require 'net/https'
require 'open3'
require 'optparse'
require 'rex/socket'
require 'rex/text'
2018-12-26 18:40:44 +00:00
require 'securerandom'
2018-08-01 06:29:39 +00:00
require 'uri'
require 'yaml'
2019-01-23 23:21:07 +00:00
include Rex::Text::Color
2018-09-28 18:48:23 +00:00
msfbase = __FILE__
while File.symlink?(msfbase)
msfbase = File.expand_path(File.readlink(msfbase), File.dirname(msfbase))
end
$:.unshift(File.expand_path(File.join(File.dirname(msfbase), 'lib')))
$:.unshift(ENV['MSF_LOCAL_LIB']) if ENV['MSF_LOCAL_LIB']
2019-01-10 17:29:08 +00:00
require 'msf/base/config'
2018-09-28 18:48:23 +00:00
require 'msf/util/helper'
2018-08-01 06:29:39 +00:00
@script_name = File.basename(__FILE__)
@framework = File.expand_path(File.dirname(__FILE__))
2019-01-10 17:29:08 +00:00
@localconf = Msf::Config.get_config_root
2018-08-01 06:29:39 +00:00
@db = "#{@localconf}/db"
@db_conf = "#{@localconf}/database.yml"
@ws_tag = 'msf-ws'
2019-01-15 04:27:17 +00:00
@ws_conf = File.join(@framework, "#{@ws_tag}.ru")
2018-08-01 06:29:39 +00:00
@ws_ssl_key_default = "#{@localconf}/#{@ws_tag}-key.pem"
@ws_ssl_cert_default = "#{@localconf}/#{@ws_tag}-cert.pem"
@ws_log = "#{@localconf}/logs/#{@ws_tag}.log"
@ws_pid = "#{@localconf}/#{@ws_tag}.pid"
@current_user = ENV['LOGNAME'] || ENV['USERNAME'] || ENV['USER']
@msf_ws_user = (@current_user || "msfadmin").to_s.strip
@ws_generated_ssl = false
@ws_api_token = nil
2018-08-20 15:43:12 +00:00
@components = %w(database webservice)
@environments = %w(production development)
2018-08-01 06:29:39 +00:00
@options = {
component: :all,
debug: false,
msf_db_name: 'msf',
msf_db_user: 'msf',
msftest_db_name: 'msftest',
msftest_db_user: 'msftest',
db_port: 5433,
db_pool: 200,
address: 'localhost',
2019-02-21 10:04:42 +00:00
port: 5443,
2018-08-01 06:29:39 +00:00
ssl: true,
ssl_cert: @ws_ssl_cert_default,
ssl_key: @ws_ssl_key_default,
2018-08-07 19:29:41 +00:00
ssl_disable_verify: true,
2018-08-01 06:29:39 +00:00
ws_env: ENV['RACK_ENV'] || 'production',
retry_max: 10,
retry_delay: 5.0,
2019-01-15 22:06:10 +00:00
ws_user: nil,
2019-01-24 19:45:44 +00:00
add_data_service: true,
data_service_name: nil,
2019-01-22 22:26:29 +00:00
use_defaults: false,
2019-01-25 19:15:45 +00:00
delete_existing_data: true
2018-08-01 06:29:39 +00:00
}
2019-01-23 23:21:07 +00:00
def supports_color?
return true if Rex::Compat.is_windows
term = Rex::Compat.getenv('TERM')
term and term.match(/(?:vt10[03]|xterm(?:-color)?|linux|screen|rxvt)/i) != nil
end
2018-08-01 06:29:39 +00:00
2019-01-16 20:05:43 +00:00
class String
2019-01-22 19:56:02 +00:00
def bold
2019-01-23 23:21:07 +00:00
substitute_colors("%bld#{self}%clr")
2019-01-22 19:56:02 +00:00
end
def underline
2019-01-23 23:21:07 +00:00
substitute_colors("%und#{self}%clr")
2019-01-22 19:56:02 +00:00
end
2019-01-16 20:05:43 +00:00
def red
2019-01-23 23:21:07 +00:00
substitute_colors("%red#{self}%clr")
2019-01-16 20:05:43 +00:00
end
def green
2019-01-23 23:21:07 +00:00
substitute_colors("%grn#{self}%clr")
2019-01-16 20:05:43 +00:00
end
def blue
2019-01-23 23:21:07 +00:00
substitute_colors("%blu#{self}%clr")
2019-01-16 20:05:43 +00:00
end
def cyan
2019-01-23 23:21:07 +00:00
substitute_colors("%cya#{self}%clr")
2019-01-16 20:05:43 +00:00
end
end
2018-08-29 18:22:29 +00:00
def run_cmd(cmd, input: nil, env: {})
2018-08-01 06:29:39 +00:00
exitstatus = 0
err = out = ""
2018-08-29 18:22:29 +00:00
puts "run_cmd: cmd=#{cmd}, input=#{input}, env=#{env}" if @options[:debug]
2018-08-01 06:29:39 +00:00
2018-08-29 18:22:29 +00:00
Open3.popen3(env, cmd) do |stdin, stdout, stderr, wait_thr|
2018-08-01 06:29:39 +00:00
stdin.puts(input) if input
if @options[:debug]
err = stderr.read
out = stdout.read
end
exitstatus = wait_thr.value.exitstatus
end
if exitstatus != 0
if @options[:debug]
puts "'#{cmd}' returned #{exitstatus}"
puts out
puts err
end
end
exitstatus
end
def run_psql(cmd, db_name: 'postgres')
if @options[:debug]
puts "psql -p #{@options[:db_port]} -c \"#{cmd};\" #{db_name}"
end
run_cmd("psql -p #{@options[:db_port]} -c \"#{cmd};\" #{db_name}")
end
def pw_gen
SecureRandom.base64(32)
end
def tail(file)
begin
File.readlines(file).last.to_s.strip
rescue
nil
end
end
def status_db
update_db_port
if Dir.exist?(@db)
if run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} status") == 0
puts "Database started at #{@db}"
else
puts "Database is not running at #{@db}"
end
else
puts "No database found at #{@db}"
end
end
def started_db
if run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} status") == 0
puts "Database already started at #{@db}"
return true
end
print "Starting database at #{@db}..."
run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} -l #{@db}/log start")
sleep(2)
if run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} status") != 0
2019-01-22 19:56:02 +00:00
puts "#{'failed'.red.bold}"
2018-08-01 06:29:39 +00:00
false
else
2019-01-22 19:56:02 +00:00
puts "#{'success'.green.bold}"
2018-08-01 06:29:39 +00:00
true
end
end
def start_db
if !Dir.exist?(@db)
puts "No database found at #{@db}, not starting"
return
end
update_db_port
2019-01-22 19:55:06 +00:00
if !started_db
2018-08-01 06:29:39 +00:00
last_log = tail("#{@db}/log")
puts last_log
if last_log =~ /not compatible/
2018-08-07 19:31:44 +00:00
puts 'Please attempt to upgrade the database manually using pg_upgrade.'
2018-08-01 06:29:39 +00:00
end
2019-01-22 22:26:29 +00:00
print_error "Your database may be corrupt. Try reinitializing."
2018-08-01 06:29:39 +00:00
end
end
def stop_db
update_db_port
if run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} status") == 0
puts "Stopping database at #{@db}"
run_cmd("pg_ctl -o \"-p #{@options[:db_port]}\" -D #{@db} stop")
else
puts "Database is no longer running at #{@db}"
end
end
def restart_db
stop_db
start_db
end
def create_db
puts "Creating database at #{@db}"
Dir.mkdir(@db)
run_cmd("initdb --auth-host=trust --auth-local=trust -E UTF8 #{@db}")
File.open("#{@db}/postgresql.conf", 'a') do |f|
f.puts "port = #{@options[:db_port]}"
end
end
def init_db
if Dir.exist?(@db)
puts "Found a database at #{@db}, checking to see if it is started"
start_db
return
end
2019-01-15 22:06:10 +00:00
if File.exist?(@db_conf) && !@options[:delete_existing_data]
2018-08-07 21:37:01 +00:00
if !load_db_config
puts "Failed to load existing database config. Please reinit and overwrite the file."
2018-08-01 06:29:39 +00:00
return
end
2018-08-07 21:37:01 +00:00
else
write_db_config
end
create_db
start_db
puts 'Creating database users'
run_psql("create user #{@options[:msf_db_user]} with password '#{@msf_pass}'")
run_psql("create user #{@options[:msftest_db_user]} with password '#{@msftest_pass}'")
run_psql("alter role #{@options[:msf_db_user]} createdb")
run_psql("alter role #{@options[:msftest_db_user]} createdb")
run_psql("alter role #{@options[:msf_db_user]} with password '#{@msf_pass}'")
run_psql("alter role #{@options[:msftest_db_user]} with password '#{@msftest_pass}'")
run_cmd("createdb -p #{@options[:db_port]} -O #{@options[:msf_db_user]} -h 127.0.0.1 -U #{@options[:msf_db_user]} -E UTF-8 -T template0 #{@options[:msf_db_name]}",
2018-08-29 18:22:29 +00:00
input: "#{@msf_pass}\n#{@msf_pass}\n")
2018-08-07 21:37:01 +00:00
run_cmd("createdb -p #{@options[:db_port]} -O #{@options[:msftest_db_user]} -h 127.0.0.1 -U #{@options[:msftest_db_user]} -E UTF-8 -T template0 #{@options[:msftest_db_name]}",
2018-08-29 18:22:29 +00:00
input: "#{@msftest_pass}\n#{@msftest_pass}\n")
2018-08-07 21:37:01 +00:00
write_db_client_auth_config
restart_db
puts 'Creating initial database schema'
Dir.chdir(@framework) do
run_cmd('bundle exec rake db:migrate')
2018-08-01 06:29:39 +00:00
end
2018-08-07 21:37:01 +00:00
end
def load_db_config
if File.file?(@db_conf)
config = YAML.load(File.read(@db_conf))
production = config['production']
if production.nil?
puts "No production section found in database config #{@db_conf}."
return false
end
2018-08-01 06:29:39 +00:00
2018-08-07 21:37:01 +00:00
test = config['test']
if test.nil?
puts "No test section found in database config #{@db_conf}."
return false
end
# get values for development and production
@options[:msf_db_name] = production['database']
@options[:msf_db_user] = production['username']
@msf_pass = production['password']
@options[:db_port] = production['port']
@options[:db_pool] = production['pool']
# get values for test
@options[:msftest_db_name] = test['database']
@options[:msftest_db_user] = test['username']
@msftest_pass = test['password']
return true
end
return false
end
def write_db_config
# Generate new database passwords if not already assigned
@msf_pass ||= pw_gen
@msftest_pass ||= pw_gen
2018-08-01 06:29:39 +00:00
# Write a default database config file
Dir.mkdir(@localconf) unless File.directory?(@localconf)
File.open(@db_conf, 'w') do |f|
f.puts <<~EOF
development: &pgsql
adapter: postgresql
database: #{@options[:msf_db_name]}
username: #{@options[:msf_db_user]}
2018-08-07 21:37:01 +00:00
password: #{@msf_pass}
2018-08-01 06:29:39 +00:00
host: 127.0.0.1
port: #{@options[:db_port]}
pool: #{@options[:db_pool]}
production: &production
<<: *pgsql
test:
<<: *pgsql
database: #{@options[:msftest_db_name]}
username: #{@options[:msftest_db_user]}
2018-08-07 21:37:01 +00:00
password: #{@msftest_pass}
2018-08-01 06:29:39 +00:00
EOF
end
File.chmod(0640, @db_conf)
end
2018-08-03 04:29:47 +00:00
def write_db_client_auth_config
client_auth_config = "#{@db}/pg_hba.conf"
puts "Writing client authentication configuration file #{client_auth_config}"
File.open(client_auth_config, 'w') do |f|
f.puts "host \"#{@options[:msf_db_name]}\" \"#{@options[:msf_db_user]}\" 127.0.0.1/32 md5"
f.puts "host \"#{@options[:msftest_db_name]}\" \"#{@options[:msftest_db_user]}\" 127.0.0.1/32 md5"
f.puts "host \"postgres\" \"#{@options[:msftest_db_user]}\" 127.0.0.1/32 md5"
f.puts "host \"template1\" all 127.0.0.1/32 trust"
if Gem.win_platform?
f.puts "host all all 127.0.0.1/32 trust"
f.puts "host all all ::1/128 trust"
else
f.puts "local all all trust"
end
end
end
2018-08-01 06:29:39 +00:00
def update_db_port
if File.file?(@db_conf)
config = YAML.load(File.read(@db_conf))
if config["production"] && config["production"]["port"]
port = config["production"]["port"]
if port != @options[:db_port]
puts "Using database port #{port} found in #{@db_conf}"
@options[:db_port] = port
end
end
end
end
def ask_yn(question)
loop do
2019-01-22 19:56:02 +00:00
print "#{'[?]'.blue.bold} #{question}: "
2018-08-01 06:29:39 +00:00
yn = STDIN.gets
case yn
when /^[Yy]/
return true
when /^[Nn]/
return false
else
puts 'Please answer yes or no.'
end
end
end
def ask_value(question, default_value)
2019-01-22 19:56:02 +00:00
print "#{'[?]'.blue.bold} #{question} [#{default_value}]: "
2018-08-01 06:29:39 +00:00
input = STDIN.gets.strip
if input.nil? || input.empty?
return default_value
else
return input
end
end
2019-01-16 23:01:09 +00:00
def ask_password(question)
2019-01-22 19:56:02 +00:00
print "#{'[?]'.blue.bold} #{question}: "
2019-01-16 23:01:09 +00:00
input = STDIN.noecho(&:gets).chomp
print "\n"
if input.nil? || input.empty?
return pw_gen
else
return input
end
end
2018-08-01 06:29:39 +00:00
2019-01-22 19:55:06 +00:00
def print_error(error)
2019-01-22 19:56:02 +00:00
puts "#{'[!]'.red.bold} #{error}"
2019-01-22 19:55:06 +00:00
end
2018-08-01 06:29:39 +00:00
def delete_db
if Dir.exist?(@db)
stop_db
2018-08-06 21:44:44 +00:00
2019-01-15 22:06:10 +00:00
if @options[:delete_existing_data]
2018-08-06 21:44:44 +00:00
puts "Deleting all data at #{@db}"
FileUtils.rm_rf(@db)
end
2019-01-15 22:06:10 +00:00
if @options[:delete_existing_data]
2018-08-01 06:29:39 +00:00
File.delete(@db_conf)
end
else
puts "No data at #{@db}, doing nothing"
end
end
def reinit_db
delete_db
init_db
end
2019-01-18 18:40:49 +00:00
class WebServicePIDStatus
RUNNING = 0
INACTIVE = 1
NO_PID_FILE = 2
end
def web_service_pid
File.file?(@ws_pid) ? tail(@ws_pid) : nil
end
def web_service_pid_status
2018-08-01 06:29:39 +00:00
if File.file?(@ws_pid)
ws_pid = tail(@ws_pid)
if ws_pid.nil? || !process_active?(ws_pid.to_i)
2019-01-18 18:40:49 +00:00
WebServicePIDStatus::INACTIVE
2018-08-01 06:29:39 +00:00
else
2019-01-18 18:40:49 +00:00
WebServicePIDStatus::RUNNING
2018-08-01 06:29:39 +00:00
end
else
2019-01-18 18:40:49 +00:00
WebServicePIDStatus::NO_PID_FILE
end
end
def status_web_service
ws_pid = web_service_pid
status = web_service_pid_status
if status == WebServicePIDStatus::RUNNING
puts "MSF web service is running as PID #{ws_pid}"
elsif status == WebServicePIDStatus::INACTIVE
puts "MSF web service is not running: PID file found at #{@ws_pid}, but no active process running as PID #{ws_pid}"
elsif status == WebServicePIDStatus::NO_PID_FILE
2018-08-07 22:37:18 +00:00
puts "MSF web service is not running: no PID file found at #{@ws_pid}"
2018-08-01 06:29:39 +00:00
end
end
def init_web_service
2019-01-18 18:40:49 +00:00
if web_service_pid_status == WebServicePIDStatus::RUNNING
puts "MSF web service is already running as PID #{web_service_pid}"
return false
end
2019-01-22 22:26:29 +00:00
unless @options[:use_defaults]
if @options[:ws_user].nil?
@msf_ws_user = ask_value('Initial MSF web service account username?', @msf_ws_user)
else
@msf_ws_user = @options[:ws_user]
end
2018-08-01 06:29:39 +00:00
end
2019-01-22 22:26:29 +00:00
if @options[:use_defaults]
@msf_ws_pass = pw_gen
elsif @options[:ws_pass].nil?
2019-01-16 23:01:09 +00:00
@msf_ws_pass = ask_password('Initial MSF web service account password? (Leave blank for random password)')
else
@msf_ws_pass = @options[:ws_pass]
end
2019-01-23 22:08:15 +00:00
if should_generate_web_service_ssl && @options[:delete_existing_data]
2018-08-01 06:29:39 +00:00
generate_web_service_ssl(key: @options[:ssl_key], cert: @options[:ssl_cert])
end
2018-08-07 19:29:41 +00:00
if start_web_service(expect_auth: false)
2018-08-15 20:40:40 +00:00
if add_web_service_workspace && add_web_service_user
2018-08-03 16:30:03 +00:00
output_web_service_information
2018-08-15 20:40:40 +00:00
else
puts 'Failed to complete MSF web service configuration, please reinitialize.'
stop_web_service
2018-08-03 16:30:03 +00:00
end
2018-08-01 06:29:39 +00:00
end
end
2018-08-07 19:29:41 +00:00
def start_web_service(expect_auth: true)
2018-08-01 06:29:39 +00:00
unless File.file?(@ws_conf)
puts "No MSF web service configuration found at #{@ws_conf}, not starting"
return false
end
2018-08-06 20:26:36 +00:00
# check if MSF web service is already started
2019-01-18 18:40:49 +00:00
ws_pid = web_service_pid
status = web_service_pid_status
if status == WebServicePIDStatus::RUNNING
puts "MSF web service is already running as PID #{ws_pid}"
return false
elsif status == WebServicePIDStatus::INACTIVE
puts "MSF web service PID file found, but no active process running as PID #{ws_pid}"
puts "Deleting MSF web service PID file #{@ws_pid}"
File.delete(@ws_pid)
2018-08-06 20:26:36 +00:00
end
2018-08-01 06:29:39 +00:00
# daemonize MSF web service
2019-01-16 20:05:43 +00:00
print 'Attempting to start MSF web service...'
2018-08-01 06:29:39 +00:00
if run_cmd("#{thin_cmd} start") == 0
2018-08-07 19:29:41 +00:00
# wait until web service is online
2018-08-06 20:26:36 +00:00
retry_count = 0
2018-08-07 19:29:41 +00:00
response_data = web_service_online_check(expect_auth: expect_auth)
is_online = response_data[:state] != :offline
while !is_online && retry_count < @options[:retry_max]
2018-08-06 20:26:36 +00:00
retry_count += 1
if @options[:debug]
2018-08-07 19:29:41 +00:00
puts "MSF web service doesn't appear to be online. Sleeping #{@options[:retry_delay]}s until check #{retry_count}/#{@options[:retry_max]}"
2018-08-06 20:26:36 +00:00
end
sleep(@options[:retry_delay])
2018-08-07 19:29:41 +00:00
response_data = web_service_online_check(expect_auth: expect_auth)
is_online = response_data[:state] != :offline
2018-08-06 20:26:36 +00:00
end
2019-01-16 20:05:43 +00:00
if response_data[:state] == :online
2019-01-22 19:56:02 +00:00
puts "#{'success'.green.bold}"
2018-08-07 19:29:41 +00:00
puts 'MSF web service started and online'
2018-08-06 20:26:36 +00:00
return true
2019-01-16 20:05:43 +00:00
elsif response_data[:state] == :error
2019-01-22 19:56:02 +00:00
puts "#{'failed'.red.bold}"
print_error 'MSF web service appears to be started, but may not operate as expected.'
2018-08-07 19:29:41 +00:00
puts "#{response_data[:message]}"
2019-01-16 20:05:43 +00:00
else
2019-01-22 19:56:02 +00:00
puts "#{'failed'.red.bold}"
print_error 'MSF web service does not appear to be started.'
2018-08-06 20:26:36 +00:00
end
2018-08-07 19:29:41 +00:00
puts "Please see #{@ws_log} for additional details."
return false
else
2019-01-22 19:56:02 +00:00
puts "#{'failed'.red.bold}"
2018-08-07 19:29:41 +00:00
puts 'Failed to start MSF web service'
return false
2018-08-01 06:29:39 +00:00
end
end
def stop_web_service
2019-01-18 18:40:49 +00:00
ws_pid = web_service_pid
status = web_service_pid_status
if status == WebServicePIDStatus::RUNNING
puts "Stopping MSF web service PID #{ws_pid}"
run_cmd("#{thin_cmd} stop")
else
2018-08-07 19:31:44 +00:00
puts 'MSF web service is no longer running'
2019-01-18 18:40:49 +00:00
if status == WebServicePIDStatus::INACTIVE
2018-08-01 06:29:39 +00:00
puts "Deleting MSF web service PID file #{@ws_pid}"
File.delete(@ws_pid)
end
end
end
def restart_web_service
stop_web_service
start_web_service
end
def delete_web_service
stop_web_service
2019-01-25 19:15:45 +00:00
File.delete(@ws_pid) if web_service_pid_status == WebServicePIDStatus::INACTIVE
File.delete(@options[:ssl_key]) if File.file?(@options[:ssl_key])
File.delete(@options[:ssl_cert]) if File.file?(@options[:ssl_cert])
2018-08-01 06:29:39 +00:00
end
def reinit_web_service
delete_web_service
init_web_service
end
def generate_web_service_ssl(key:, cert:)
@ws_generated_ssl = true
2019-01-15 22:06:10 +00:00
if (File.file?(key) || File.file?(cert)) && !@options[:delete_existing_data]
2018-08-01 06:29:39 +00:00
return
end
2018-08-07 19:31:44 +00:00
puts 'Generating SSL key and certificate for MSF web service'
2018-08-01 06:29:39 +00:00
@ssl_key, @ssl_cert, @ssl_extra_chain_cert = Rex::Socket::Ssl.ssl_generate_certificate
# write PEM format key and certificate
mode = 'wb'
mode_int = 0600
File.open(key, mode) { |f| f.write(@ssl_key.to_pem) }
File.chmod(mode_int, key)
File.open(cert, mode) { |f| f.write(@ssl_cert.to_pem) }
File.chmod(mode_int, cert)
end
2018-08-07 19:29:41 +00:00
def web_service_online_check(expect_auth:)
2018-08-01 06:29:39 +00:00
msf_version_uri = get_web_service_uri(path: '/api/v1/msf/version')
2018-08-07 19:29:41 +00:00
response_data = http_request(uri: msf_version_uri, method: :get,
2018-08-06 20:16:47 +00:00
skip_verify: skip_ssl_verify?, cert: get_ssl_cert)
2018-08-07 19:29:41 +00:00
if !response_data[:exception].nil? && response_data[:exception].is_a?(Errno::ECONNREFUSED)
response_data[:state] = :offline
elsif !response_data[:exception].nil? && response_data[:exception].is_a?(OpenSSL::OpenSSLError)
response_data[:state] = :error
response_data[:message] = 'Detected an SSL issue. Please set the same options used to initialize the web service or reinitialize.'
elsif !response_data[:response].nil? && response_data[:response].dig(:error, :code) == 401
if expect_auth
response_data[:state] = :online
else
response_data[:state] = :error
response_data[:message] = 'MSF web service expects authentication. If you wish to reinitialize the web service account you will need to reinitialize the database.'
end
elsif !response_data[:response].nil? && !response_data[:response].dig(:data, :metasploit_version).nil?
response_data[:state] = :online
else
response_data[:state] = :error
end
puts "web_service_online: expect_auth=#{expect_auth}, response_msg=#{response_data}" if @options[:debug]
response_data
2018-08-01 06:29:39 +00:00
end
2018-08-15 20:40:40 +00:00
def add_web_service_workspace(name: 'default')
# Send request to create new workspace
workspace_data = { name: name }
workspaces_uri = get_web_service_uri(path: '/api/v1/workspaces')
response_data = http_request(uri: workspaces_uri, data: workspace_data, method: :post,
skip_verify: skip_ssl_verify?, cert: get_ssl_cert)
response = response_data[:response]
puts "add_web_service_workspace: add workspace response=#{response}" if @options[:debug]
if response.nil? || response.dig(:data, :name) != name
2019-01-22 19:56:02 +00:00
print_error "Error creating MSF web service workspace '#{name}'"
2018-08-15 20:40:40 +00:00
return false
end
return true
end
2018-08-01 06:29:39 +00:00
def add_web_service_user
puts "Creating MSF web service user #{@msf_ws_user}"
# Generate new web service user password
2019-01-16 23:01:09 +00:00
cred_data = { username: @msf_ws_user, password: @msf_ws_pass }
2018-08-01 06:29:39 +00:00
# Send request to create new admin user
user_data = cred_data.merge({ admin: true })
user_uri = get_web_service_uri(path: '/api/v1/users')
2018-08-07 19:29:41 +00:00
response_data = http_request(uri: user_uri, data: user_data, method: :post,
2018-08-06 20:16:47 +00:00
skip_verify: skip_ssl_verify?, cert: get_ssl_cert)
2018-08-07 19:29:41 +00:00
response = response_data[:response]
2018-08-01 06:29:39 +00:00
puts "add_web_service_user: create user response=#{response}" if @options[:debug]
if response.nil? || response.dig(:data, :username) != @msf_ws_user
2019-01-22 19:56:02 +00:00
print_error "Error creating MSF web service user #{@msf_ws_user}"
2018-08-01 06:29:39 +00:00
return false
end
2019-01-16 20:05:43 +00:00
2019-01-16 23:01:09 +00:00
puts "\n#{' ############################################################'.cyan}"
2019-01-16 20:05:43 +00:00
print "#{' ## '.cyan}"
2019-01-22 19:56:02 +00:00
print"#{'MSF Web Service Credentials'.cyan.bold.underline}"
2019-01-16 20:05:43 +00:00
puts"#{' ##'.cyan}"
puts "#{' ## ##'.cyan}"
puts "#{' ## Please store these credentials securely. ##'.cyan}"
puts "#{' ## You will need them to connect to the webservice. ##'.cyan}"
puts "#{' ############################################################'.cyan}"
2019-01-22 19:56:02 +00:00
puts "\n#{'MSF web service username'.cyan.bold}: #{@msf_ws_user}"
puts "#{'MSF web service password'.cyan.bold}: #{@msf_ws_pass}"
2018-08-01 06:29:39 +00:00
# Send request to create new API token for the user
generate_token_uri = get_web_service_uri(path: '/api/v1/auth/generate-token')
2018-12-17 18:50:39 +00:00
response_data = http_request(uri: generate_token_uri, data: cred_data, method: :post,
2018-08-06 20:16:47 +00:00
skip_verify: skip_ssl_verify?, cert: get_ssl_cert)
2018-08-07 19:29:41 +00:00
response = response_data[:response]
2018-08-01 06:29:39 +00:00
puts "add_web_service_user: generate token response=#{response}" if @options[:debug]
if response.nil? || (@ws_api_token = response.dig(:data, :token)).nil?
2019-01-22 19:56:02 +00:00
print_error "Error creating MSF web service user API token"
2018-08-01 06:29:39 +00:00
return false
end
2019-01-22 19:56:02 +00:00
puts "#{'MSF web service user API token'.cyan.bold}: #{@ws_api_token}"
2018-08-01 06:29:39 +00:00
return true
end
2018-08-03 16:30:03 +00:00
def output_web_service_information
2019-01-16 23:01:09 +00:00
puts "\n\n"
2018-08-03 16:30:03 +00:00
puts 'MSF web service configuration complete'
2019-01-25 20:42:27 +00:00
if @options[:add_data_service]
data_service_name = @options[:data_service_name] || "local-#{@options[:ssl] ? 'https' : 'http'}-data-service"
puts "The web service has been configured as your default data service in msfconsole with the name \"#{data_service_name}\""
else
puts "No data service has been configured in msfconsole."
end
puts ''
puts 'If needed, manually reconnect to the data service in msfconsole using the command:'
2018-09-01 03:12:23 +00:00
puts "#{get_db_connect_command}"
2018-08-03 16:30:03 +00:00
puts ''
puts 'The username and password are credentials for the API account:'
puts "#{get_web_service_uri(path: '/api/v1/auth/account')}"
2018-08-29 18:29:00 +00:00
puts ''
2018-09-01 03:12:23 +00:00
persist_data_service
2018-08-29 18:29:00 +00:00
end
2018-09-01 03:12:23 +00:00
def persist_data_service
2019-01-25 18:08:28 +00:00
data_service_name = "local-#{@options[:ssl] ? 'https' : 'http'}-data-service"
2019-01-24 19:45:44 +00:00
if !@options[:add_data_service]
return
elsif !@options[:data_service_name].nil?
data_service_name = @options[:data_service_name]
end
# execute msfconsole commands to add and persist the data service connection
connect_cmd = get_db_connect_command(name: data_service_name)
cmd = "msfconsole -qx \"#{connect_cmd}; db_save; exit\""
if run_cmd(cmd) != 0
# attempt to execute msfconsole in the current working directory
if run_cmd(cmd, env: {'PATH' => ".:#{ENV["PATH"]}"}) != 0
puts 'Failed to run msfconsole and persist the data service connection'
2018-08-29 18:29:00 +00:00
end
end
2019-01-24 19:45:44 +00:00
2018-08-03 16:30:03 +00:00
end
2018-09-01 03:12:23 +00:00
def get_db_connect_command(name: nil)
# build db_connect command based on install options
connect_cmd = "db_connect"
connect_cmd << " --name #{name}" unless name.nil?
connect_cmd << " --token #{@ws_api_token}"
connect_cmd << " --cert #{@options[:ssl_cert]}" if @options[:ssl]
connect_cmd << " --skip-verify" if skip_ssl_verify?
connect_cmd << " #{get_web_service_uri}"
connect_cmd
end
2018-08-01 06:29:39 +00:00
def get_web_service_uri(path: nil)
uri_class = @options[:ssl] ? URI::HTTPS : URI::HTTP
uri_class.build({host: get_web_service_host, port: @options[:port], path: path})
end
def get_web_service_host
# user specified any address INADDR_ANY (0.0.0.0), return a routable address
@options[:address] == '0.0.0.0' ? 'localhost' : @options[:address]
end
2018-08-06 20:16:47 +00:00
def skip_ssl_verify?
2018-08-01 06:29:39 +00:00
@ws_generated_ssl || @options[:ssl_disable_verify]
end
def get_ssl_cert
@options[:ssl] ? @options[:ssl_cert] : nil
end
def thin_cmd
server_opts = "--rackup #{@ws_conf} --address #{@options[:address]} --port #{@options[:port]}"
ssl_opts = @options[:ssl] ? "--ssl --ssl-key-file #{@options[:ssl_key]} --ssl-cert-file #{@options[:ssl_cert]}" : ''
2018-08-06 20:16:47 +00:00
ssl_opts << ' --ssl-disable-verify' if skip_ssl_verify?
2018-08-01 06:29:39 +00:00
adapter_opts = "--environment #{@options[:ws_env]}"
daemon_opts = "--daemonize --log #{@ws_log} --pid #{@ws_pid} --tag #{@ws_tag}"
all_opts = [server_opts, ssl_opts, adapter_opts, daemon_opts].reject(&:empty?).join(' ')
"thin #{all_opts}"
end
def process_active?(pid)
begin
Process.kill(0, pid)
true
rescue Errno::ESRCH
false
end
end
2018-08-15 20:40:40 +00:00
def http_request(uri:, query: nil, data: nil, method: :get, headers: nil, skip_verify: false, cert: nil)
all_headers = { 'User-Agent': @script_name }
all_headers.merge!(headers) unless headers.nil?
2018-08-01 06:29:39 +00:00
query_str = (!query.nil? && !query.empty?) ? URI.encode_www_form(query.compact) : nil
uri.query = query_str
http = Net::HTTP.new(uri.host, uri.port)
if uri.is_a?(URI::HTTPS)
http.use_ssl = true
if skip_verify
http.verify_mode = OpenSSL::SSL::VERIFY_NONE
else
# https://stackoverflow.com/questions/22093042/implementing-https-certificate-pubkey-pinning-with-ruby
http.verify_mode = OpenSSL::SSL::VERIFY_PEER
user_passed_cert = OpenSSL::X509::Certificate.new(File.read(cert))
http.verify_callback = lambda do |preverify_ok, cert_store|
server_cert = cert_store.chain[0]
return true unless server_cert.to_der == cert_store.current_cert.to_der
same_public_key?(server_cert, user_passed_cert)
end
end
end
begin
2018-08-07 19:29:41 +00:00
response_data = { response: nil }
2018-08-01 06:29:39 +00:00
case method
when :get
2018-08-15 20:40:40 +00:00
request = Net::HTTP::Get.new(uri.request_uri, initheader=all_headers)
2018-08-01 06:29:39 +00:00
when :post
2018-08-15 20:40:40 +00:00
request = Net::HTTP::Post.new(uri.request_uri, initheader=all_headers)
2018-08-01 06:29:39 +00:00
else
raise Exception, "Request method #{method} is not handled"
end
request.content_type = 'application/json'
unless data.nil?
json_body = data.to_json
request.body = json_body
end
response = http.request(request)
unless response.body.nil? || response.body.empty?
2018-08-07 19:29:41 +00:00
response_data[:response] = JSON.parse(response.body, symbolize_names: true)
2018-08-01 06:29:39 +00:00
end
rescue => e
2018-08-07 19:29:41 +00:00
response_data[:exception] = e
2018-08-01 06:29:39 +00:00
puts "Problem with HTTP #{method} request #{uri.request_uri}, message: #{e.message}" if @options[:debug]
end
2018-08-07 19:29:41 +00:00
response_data
2018-08-01 06:29:39 +00:00
end
# Tells us whether the private keys on the passed certificates match
# and use the same algo
def same_public_key?(ref_cert, actual_cert)
pkr, pka = ref_cert.public_key, actual_cert.public_key
# First check if the public keys use the same crypto...
return false unless pkr.class == pka.class
# ...and then - that they have the same contents
return false unless pkr.to_pem == pka.to_pem
true
end
def parse_args(args)
subtext = <<~USAGE
Commands:
init initialize the component
reinit delete and reinitialize the component
delete delete and stop the component
status check component status
start start the component
stop stop the component
restart restart the component
USAGE
parser = OptionParser.new do |opts|
opts.banner = "Usage: #{@script_name} [options] <command>"
opts.separator('Manage a Metasploit Framework database and web service')
opts.separator('')
opts.separator('General Options:')
2018-08-20 15:43:12 +00:00
opts.on('--component COMPONENT', @components + ['all'], 'Component used with provided command (default: all)',
2018-08-01 06:29:39 +00:00
" (#{@components.join(', ')})") { |component|
@options[:component] = component.to_sym
}
2018-08-20 15:43:12 +00:00
opts.on('-d', '--debug', 'Enable debug output') { |d| @options[:debug] = d }
opts.on('-h', '--help', 'Show this help message') {
puts opts
exit
}
2019-01-22 22:26:29 +00:00
opts.on('--use-defaults', 'Accept all defaults and do not prompt for options during an init') { |d|
@options[:use_defaults] = d
}
2018-08-01 06:29:39 +00:00
opts.separator('')
opts.separator('Database Options:')
2018-08-20 15:43:12 +00:00
opts.on('--msf-db-name NAME', "Database name (default: #{@options[:msf_db_name]})") { |n|
2018-08-01 06:29:39 +00:00
@options[:msf_db_name] = n
}
2018-08-20 15:43:12 +00:00
opts.on('--msf-db-user-name USER', "Database username (default: #{@options[:msf_db_user]})") { |u|
2018-08-01 06:29:39 +00:00
@options[:msf_db_user] = u
}
2018-08-20 15:43:12 +00:00
opts.on('--msf-test-db-name NAME', "Test database name (default: #{@options[:msftest_db_name]})") { |n|
2018-08-01 06:29:39 +00:00
@options[:msftest_db_name] = n
}
2018-08-20 15:43:12 +00:00
opts.on('--msf-test-db-user-name USER', "Test database username (default: #{@options[:msftest_db_user]})") { |u|
2018-08-01 06:29:39 +00:00
@options[:msftest_db_user] = u
}
2018-08-20 15:43:12 +00:00
opts.on('--db-port PORT', Integer, "Database port (default: #{@options[:db_port]})") { |p|
2018-08-01 06:29:39 +00:00
@options[:db_port] = p
}
2018-08-20 15:43:12 +00:00
opts.on('--db-pool MAX', Integer, "Database connection pool size (default: #{@options[:db_pool]})") { |m|
2018-08-01 06:29:39 +00:00
@options[:db_pool] = m
}
opts.separator('')
opts.separator('Web Service Options:')
2018-08-20 15:43:12 +00:00
opts.on('-a', '--address ADDRESS',
2018-08-01 06:29:39 +00:00
"Bind to host address (default: #{@options[:address]})") { |a|
@options[:address] = a
}
2018-08-20 15:43:12 +00:00
opts.on('-p', '--port PORT', Integer,
2018-08-01 06:29:39 +00:00
"Web service port (default: #{@options[:port]})") { |p|
@options[:port] = p
}
2018-08-20 15:43:12 +00:00
opts.on('--[no-]ssl', "Enable SSL (default: #{@options[:ssl]})") { |s| @options[:ssl] = s }
2018-08-01 06:29:39 +00:00
2018-08-20 15:43:12 +00:00
opts.on('--ssl-key-file PATH', "Path to private key (default: #{@options[:ssl_key]})") { |p|
2018-08-01 06:29:39 +00:00
@options[:ssl_key] = p
}
2018-08-20 15:43:12 +00:00
opts.on('--ssl-cert-file PATH', "Path to certificate (default: #{@options[:ssl_cert]})") { |p|
2018-08-01 06:29:39 +00:00
@options[:ssl_cert] = p
}
2018-08-20 15:43:12 +00:00
opts.on('--[no-]ssl-disable-verify',
2018-08-01 06:29:39 +00:00
"Disables (optional) client cert requests (default: #{@options[:ssl_disable_verify]})") { |v|
@options[:ssl_disable_verify] = v
}
2018-08-20 15:43:12 +00:00
opts.on('--environment ENV', @environments,
2018-08-01 06:29:39 +00:00
"Web service framework environment (default: #{@options[:ws_env]})",
2018-08-20 15:43:12 +00:00
" (#{@environments.join(', ')})") { |e|
2018-08-01 06:29:39 +00:00
@options[:ws_env] = e
}
2018-08-20 15:43:12 +00:00
opts.on('--retry-max MAX', Integer,
2018-08-01 06:29:39 +00:00
"Maximum number of web service connect attempts (default: #{@options[:retry_max]})") { |m|
@options[:retry_max] = m
}
2018-08-20 15:43:12 +00:00
opts.on('--retry-delay DELAY', Float,
2018-08-01 06:29:39 +00:00
"Delay in seconds between web service connect attempts (default: #{@options[:retry_delay]})") { |d|
@options[:retry_delay] = d
}
2018-08-20 15:43:12 +00:00
opts.on('--user USER', 'Initial web service admin username') { |u|
2018-08-01 06:29:39 +00:00
@options[:ws_user] = u
}
2019-01-16 23:01:09 +00:00
opts.on('--pass PASS', 'Initial web service admin password') { |p|
@options[:ws_pass] = p
}
2019-01-24 19:45:44 +00:00
opts.on('--[no-]msf-data-service NAME', 'Local msfconsole data service connection name') { |n|
if !n
@options[:add_data_service] = false
else
@options[:data_service_name] = n
end
}
2018-08-01 06:29:39 +00:00
opts.separator('')
opts.separator(subtext)
end
parser.parse!(args)
if args.length != 1
puts parser
abort
end
@options
end
def invoke_command(commands, component, command)
method = commands[component][command]
if !method.nil?
send(method)
else
2019-01-22 19:56:02 +00:00
print_error "Error: unrecognized command '#{command}' for #{component}"
2018-08-01 06:29:39 +00:00
end
end
2018-09-28 17:41:03 +00:00
def has_requirements
ret_val = true
postgresql_cmds = %w(psql pg_ctl initdb createdb)
other_cmds = %w(bundle thin)
2018-12-20 18:07:35 +00:00
missing_msg = "Missing requirement: %<name>s does not appear to be installed or '%<prog>s' is not in the environment path"
2018-09-28 17:41:03 +00:00
2018-12-20 18:07:35 +00:00
postgresql_cmds.each do |cmd|
2018-12-20 19:28:47 +00:00
next unless Msf::Util::Helper.which(cmd).nil?
2018-12-20 18:07:35 +00:00
puts missing_msg % { name: 'PostgreSQL', prog: cmd }
2018-09-28 17:41:03 +00:00
ret_val = false
end
other_cmds.each do |cmd|
2018-09-28 18:48:23 +00:00
if Msf::Util::Helper.which(cmd).nil?
2018-12-20 18:07:35 +00:00
puts missing_msg % { name: "'#{cmd}'", prog: cmd }
2018-09-28 17:41:03 +00:00
ret_val = false
end
end
ret_val
end
2018-08-01 06:29:39 +00:00
2019-01-15 22:06:10 +00:00
def should_generate_web_service_ssl
@options[:ssl] && ((!File.file?(@options[:ssl_key]) || !File.file?(@options[:ssl_cert])) ||
(@options[:ssl_key] == @ws_ssl_key_default && @options[:ssl_cert] == @ws_ssl_cert_default))
end
def prompt_for_deletion(command)
destructive_operations = [:init, :reinit, :delete]
if destructive_operations.include? command
if command == :init
2019-01-22 19:56:02 +00:00
return if web_service_pid_status != WebServicePIDStatus::NO_PID_FILE
2019-01-18 18:40:49 +00:00
if (@options[:component] == :all || @options[:component] == :webservice) && should_generate_web_service_ssl &&
(File.file?(@options[:ssl_key]) || File.file?(@options[:ssl_cert]))
2019-01-15 22:06:10 +00:00
@options[:delete_existing_data] = should_delete
return
2019-01-18 18:40:49 +00:00
end
if (@options[:component] == :all || @options[:component] == :database) && File.exist?(@db_conf)
2019-01-15 22:06:10 +00:00
@options[:delete_existing_data] = should_delete
return
end
else
@options[:delete_existing_data] = should_delete
end
end
end
def should_delete
2019-01-22 22:26:29 +00:00
return true if @options[:use_defaults]
2019-01-15 22:06:10 +00:00
ask_yn("Would you like to delete your existing data and configurations?")
end
2018-08-01 06:29:39 +00:00
if $PROGRAM_NAME == __FILE__
# Bomb out if we're root
if !Gem.win_platform? && Process.uid.zero?
puts "Please run #{@script_name} as a non-root user"
abort
end
2018-09-28 17:41:03 +00:00
unless has_requirements
abort
end
2018-08-01 06:29:39 +00:00
# map component commands to methods
commands = {
database: {
init: :init_db,
reinit: :reinit_db,
delete: :delete_db,
status: :status_db,
start: :start_db,
stop: :stop_db,
restart: :restart_db
},
webservice: {
init: :init_web_service,
reinit: :reinit_web_service,
delete: :delete_web_service,
status: :status_web_service,
start: :start_web_service,
stop: :stop_web_service,
restart: :restart_web_service
}
}
parse_args(ARGV)
command = ARGV[0].to_sym
2019-01-15 22:06:10 +00:00
prompt_for_deletion(command)
2018-08-01 06:29:39 +00:00
if @options[:component] == :all
@components.each { |component|
invoke_command(commands, component.to_sym, command)
}
else
invoke_command(commands, @options[:component], command)
end
end