Added fixes suggested by jlee-r7

additional code clean up
bug/bundler_fix
jamcut 2013-10-21 14:18:12 -04:00
parent dff26ac9ff
commit 58a43e87dd
1 changed files with 108 additions and 73 deletions

View File

@ -4,6 +4,7 @@
require 'rex/proto/http'
require 'msf/core'
require 'rexml/document'
class Metasploit3 < Msf::Auxiliary
@ -30,115 +31,149 @@ class Metasploit3 < Msf::Auxiliary
def run_host(ip)
res = send_request_cgi(
{
'uri' => target_uri.path, #wanted to use a random path but Jenkins headers were not returned
'uri' => target_uri.path,
'method' => 'GET',
'ctype' => 'text/plain',
})
if res
#check to see if we are dealing with a Jenkins installation
# check to see if we are dealing with a Jenkins installation
if not res.headers.include?('X-Jenkins')
print_status("#{rhost}:#{rport} responded with #{res.code} but does not seem to be Jenkins") if res.code != 404
return
end
else
vprint_error("No reponse recieved from #{rhost}:#{rport}")
return
end
version = res.headers['X-Jenkins']
vprint_status("#{rhost}:#{rport} Jenkins Version - #{version}")
apps = [ 'script', #exploit module for this
'view/All/newJob', #possible to exploit manually maybe there will be a module in the future
'systemInfo', #can disclose some useful information about the system
# script - exploit module for this
# view/All/newJob - can be exploited manually
# asynchPeople - Jenkins users
# systemInfo - system information
apps = [ 'script',
'view/All/newJob',
'asynchPeople/',
'systemInfo',
]
apps.each do |app|
check_app(app, version)
check_app(app)
end
end
def check_app(app, version)
def check_app(app)
uri_path = normalize_uri(target_uri.path, app)
res = send_request_cgi({
'uri' => uri_path,
'method' => 'GET',
'ctype' => 'text/plain',
})
case (res.code)
if not res
vprint_error("Failed to connect to #{rhost}:#{rport}#{uri_path}")
return
end
case res.code
when 200
print_good("#{rhost}:#{rport} /#{app} does not require authentication (200)")
print_good("#{rhost}:#{rport}#{uri_path} does not require authentication (200)")
case app
when "systemInfo"
parse_system_info(res.body, version)
when "script"
report_vuln(
:host => rhost,
:port => rport,
:proto => 'tcp',
:sname => (ssl ? 'https' : 'http'),
:name => self.name,
:info => "Module #{self.fullname} confirmed access to the Jenkins Script Console with no authentication"
)
when "systemInfo"
parse_system_info(res.body)
when "script"
report_vuln(
:host => rhost,
:port => rport,
:proto => 'tcp',
:sname => (ssl ? 'https' : 'http'),
:name => self.name,
:info => "Module #{self.fullname} confirmed access to the Jenkins Script Console with no authentication"
)
end
when 403
vprint_status("#{rhost}:#{rport} #{app} restricted (403)")
vprint_status("#{rhost}:#{rport}#{uri_path} restricted (403)")
when 401
vprint_status("#{rhost}:#{rport} #{app} requires authentication (401): #{res.headers['WWW-Authenticate']}")
vprint_status("#{rhost}:#{rport}#{uri_path} requires authentication (401): #{res.headers['WWW-Authenticate']}")
when 404
vprint_status("#{rhost}:#{rport} #{app} not found (404)")
vprint_status("#{rhost}:#{rport}#{uri_path} not found (404)")
when 301
vprint_status("#{rhost}:#{rport} #{app} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
when 302
vprint_status("#{rhost}:#{rport} #{app} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
else
vprint_status("#{rhost}:#{rport} Don't know how to handle response code #{res.code}")
vprint_status("#{rhost}:#{rport}#{uri_path} Don't know how to handle response code #{res.code}")
end
end
def parse_system_info(body)
vprint_status("#{rhost}:#{rport} getting useful information from systemInfo")
infos = {
"os.name" => nil,
"os.version" => nil,
"sun.os.patch.level" => nil,
"os.arch" => nil,
"user.name" => nil,
"USERDOMAIN" => nil,
"user.home" => nil,
"user.language" => nil,
"user.country" => nil,
"user.timezone" => nil,
"COMPUTERNAME" => nil,
"SystemDrive" => nil,
"TEMP" => nil,
"TMP" => nil,
"SHELL" => nil
}
# remove unclosed tags for REXML
body = body.gsub('<wbr>', '')
body = body.gsub('<br>', '')
doc = REXML::Document.new(body)
tds = doc.get_elements("//td")
tdcounter = 0
tds.each do |td|
td = td.get_text.to_s.strip
infos.each do |k, v|
if td == k
infos[k] = tds[tdcounter +1].get_text.to_s.strip
end
end
tdcounter +=1
end
def parse_system_info(body, version)
vprint_status("#{rhost}:#{rport} getting useful information from /systemInfo")
infos = ["os.name", "sun.os.patch.level", "os.arch", "user.name", "USERDOMAIN", "SHELL"]
out = []
if version.to_f < 1.526 #html parsing is version dependent
lines = body.split('</tr>')
infos.each do |info|
lines.each do |line|
next if not line.include? info
line = line.sub('<tr><td class="pane">', '')
line = line.sub(info, '')
line = line.sub('</td><td class="pane">', '')
line = line.sub('</td>', '')
out.push(info)
out.push(line)
end
end
elsif version.to_f >= 1.526
lines = body.split('</td></tr><tr><td class="pane">')
infos.each do |info|
lines.each do |line|
next if not line.include? info
line = line.sub('</td><td class="pane" style="white-space: normal">', '')
line = line.sub(info, '')
line = line.strip
out.push(info)
out.push(line)
end
end
end
#print out the goodies
out = out.uniq
out.each do |o|
dex = out.index(o)
case o
when "os.name"
print_line(" OS: " + out[dex+1])
when "sun.os.patch.level"
print_line(" Patch Level: " + out[dex+1])
when "os.arch"
print_line(" Arch: " + out[dex+1])
when "user.name"
print_line(" User: " + out[dex+1])
when "USERDOMAIN"
print_line(" Domain: " + out[dex+1])
when "SHELL"
print_line(" Shell: " + out[dex+1])
# print out the goodies
infos.each do |k, v|
next if v.nil?
case k
when "os.name"
print_line(" OS: #{v}")
when "os.version"
print_line(" OS Version: #{v}")
when "sun.os.patch.level"
print_line(" Patch Level: #{v}")
when "os.arch"
print_line(" Arch: #{v}")
when "user.name"
print_line(" User: #{v}")
when "USERDOMAIN"
print_line(" Domain: #{v}")
when "COMPUTERNAME"
print_line(" Computer Name: #{v}")
when "SystemDrive"
vprint_line(" System Drive: #{v}")
when "SHELL"
print_line(" Shell: #{v}")
when "TEMP"
print_line(" Temp Directory: #{v}")
when "TMP"
print_line(" Temp Directory: #{v}") if infos["TEMP"].nil?
when "user.home"
vprint_line(" Home Directory: #{v}")
when "user.language"
vprint_line(" Language: #{v}")
when "user.country"
vprint_line(" Country: #{v}")
when "user.timezone"
vprint_line(" Timezone: #{v}")
end
end
print_line('')
end