2017-10-25 15:11:25 +00:00
|
|
|
<ruby>
|
|
|
|
|
|
|
|
#
|
|
|
|
# This resource script will check for vulnerabilities related to
|
|
|
|
# programs and services used by developers, including the following:
|
|
|
|
#
|
|
|
|
# * NodeJS debug (multi/misc/nodejs_v8_debugger)
|
|
|
|
# * distcc (unix/misc/distcc_exe)
|
|
|
|
# * Jenkins (linux/misc/jenkins_java_deserialize)
|
|
|
|
# * GitHub Enterprise (linux/http/github_enterprise_secret)
|
|
|
|
#
|
|
|
|
# It is worth noting that ONLY CHECKS are performed, no active exploiting.
|
|
|
|
# This makes it safe to run in many environments.
|
|
|
|
#
|
2017-10-25 20:39:23 +00:00
|
|
|
# Authors:
|
|
|
|
# * pbarry-r7
|
|
|
|
# * dmohanty-r7
|
2017-10-25 15:11:25 +00:00
|
|
|
#
|
|
|
|
|
|
|
|
@job_ids = []
|
|
|
|
|
|
|
|
def wait_until_jobs_done
|
2017-10-25 20:43:25 +00:00
|
|
|
loop do
|
2017-10-25 15:11:25 +00:00
|
|
|
@job_ids.each do |job_id|
|
|
|
|
current_job_ids = framework.jobs.keys.map { |e| e.to_i }
|
|
|
|
sleep 1 if current_job_ids.include?(job_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
return
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-10-25 20:39:23 +00:00
|
|
|
def run_scanner(host:, mod_name:)
|
|
|
|
begin
|
|
|
|
mod = framework.auxiliary.create(mod_name)
|
|
|
|
mod.datastore['RHOSTS'] = host.address
|
|
|
|
print_line("Running the #{mod.name}...")
|
|
|
|
result = mod.run_simple({'RunAsJob': true, 'LocalOutput': self.output})
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error(e.message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-10-25 15:11:25 +00:00
|
|
|
def check_exploit(host:, mod_name:, vuln_check_ret_val:)
|
|
|
|
begin
|
|
|
|
mod = framework.exploits.create(mod_name)
|
|
|
|
mod.datastore['RHOST'] = host.address
|
|
|
|
print_line("Looking for #{mod.name}...")
|
|
|
|
result = mod.check_simple({'RunAsJob': true, 'LocalOutput': self.output})
|
|
|
|
@job_ids << mod.job_id if mod.job_id
|
|
|
|
if vuln_check_ret_val.index(result)
|
|
|
|
print_line("HOST #{host.address} APPEARS VULNERABLE TO #{mod.name}")
|
|
|
|
framework.db.report_vuln(
|
|
|
|
workspace: mod.workspace,
|
|
|
|
host: mod.rhost,
|
|
|
|
name: mod.name,
|
|
|
|
info: "This was flagged as likely vulnerable by the explicit check of #{mod.fullname}.",
|
|
|
|
refs: mod.references
|
|
|
|
)
|
|
|
|
end
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_error(e.message)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def setup
|
|
|
|
# Test and see if we have a database connected
|
2017-10-25 20:39:23 +00:00
|
|
|
if not (framework.db and framework.db.active)
|
2017-10-25 15:11:25 +00:00
|
|
|
print_error("Database connection isn't established")
|
|
|
|
return false
|
|
|
|
end
|
|
|
|
|
|
|
|
run_single("setg verbose true")
|
|
|
|
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
|
|
|
def main
|
|
|
|
framework.db.workspace.hosts.each do |host|
|
|
|
|
print_line("Checking IP: #{host.address}, OS: #{host.os_name}...")
|
|
|
|
|
2017-10-25 20:39:23 +00:00
|
|
|
# Modules
|
|
|
|
{ 'multi/misc/nodejs_v8_debugger': [ Exploit::CheckCode::Appears ],
|
|
|
|
'unix/misc/distcc_exec': [ Exploit::CheckCode::Vulnerable ],
|
|
|
|
'unix/misc/qnx_qconn_exec': [ Exploit::CheckCode::Vulnerable ],
|
|
|
|
'linux/misc/jenkins_java_deserialize': [ Exploit::CheckCode::Vulnerable ],
|
|
|
|
'linux/http/github_enterprise_secret': [ Exploit::CheckCode::Vulnerable ],
|
|
|
|
'multi/http/traq_plugin_exec': [ Exploit::CheckCode::Appears ],
|
|
|
|
'multi/http/builderengine_upload_exec': [ Exploit::CheckCode::Appears ],
|
|
|
|
'multi/http/mantisbt_php_exec': [ Exploit::CheckCode::Appears ],
|
|
|
|
'multi/http/vbulletin_unserialize': [ Exploit::CheckCode::Appears ],
|
|
|
|
'unix/webapp/vbulletin_vote_sqli_exec': [ Exploit::CheckCode::Appears ],
|
|
|
|
'multi/misc/java_jmx_server': [ Exploit::CheckCode::Appears,
|
2017-10-25 20:45:59 +00:00
|
|
|
Exploit::CheckCode::Detected ] }.each do |mod,ret_val|
|
2017-10-25 20:39:23 +00:00
|
|
|
check_exploit(host: host,
|
|
|
|
mod_name: mod.to_s,
|
|
|
|
vuln_check_ret_val: ret_val)
|
|
|
|
end
|
2017-10-25 15:11:25 +00:00
|
|
|
|
2017-10-25 20:39:23 +00:00
|
|
|
# Scanners
|
|
|
|
[ 'scanner/misc/java_rmi_server' ].each do |mod|
|
|
|
|
run_scanner(host: host, mod_name: mod.to_s)
|
|
|
|
end
|
2017-10-25 15:11:25 +00:00
|
|
|
end
|
2017-10-25 16:41:14 +00:00
|
|
|
|
2017-10-25 15:11:25 +00:00
|
|
|
wait_until_jobs_done
|
|
|
|
end
|
|
|
|
|
|
|
|
abort("Error during setup, exiting.") unless setup
|
|
|
|
main
|
|
|
|
|
|
|
|
</ruby>
|