Retab changes for PR #2383
parent
0214501891
commit
de0d09886c
|
@ -8,173 +8,173 @@ require 'rexml/document'
|
|||
|
||||
class Metasploit3 < Msf::Auxiliary
|
||||
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
include Msf::Auxiliary::Scanner
|
||||
include Msf::Auxiliary::Report
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
include Msf::Auxiliary::Scanner
|
||||
include Msf::Auxiliary::Report
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Jenkins Vulnerability Scanner',
|
||||
'Description' => %q{
|
||||
This module scans a Jenkins installation for a few vulnerablities.
|
||||
},
|
||||
'Author' => 'Jeff McCutchan',
|
||||
'License' => MSF_LICENSE
|
||||
))
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'Jenkins Vulnerability Scanner',
|
||||
'Description' => %q{
|
||||
This module scans a Jenkins installation for a few vulnerablities.
|
||||
},
|
||||
'Author' => 'Jeff McCutchan',
|
||||
'License' => MSF_LICENSE
|
||||
))
|
||||
|
||||
register_options(
|
||||
[
|
||||
OptString.new('TARGETURI', [ true, "Path to Jenkins instance", "/jenkins/"]),
|
||||
], self.class)
|
||||
end
|
||||
register_options(
|
||||
[
|
||||
OptString.new('TARGETURI', [ true, "Path to Jenkins instance", "/jenkins/"]),
|
||||
], self.class)
|
||||
end
|
||||
|
||||
def run_host(ip)
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => target_uri.path,
|
||||
'method' => 'GET',
|
||||
'ctype' => 'text/plain',
|
||||
})
|
||||
if res
|
||||
# check to see if we are dealing with a Jenkins installation
|
||||
if not res.headers.include?('X-Jenkins')
|
||||
print_status("#{rhost}:#{rport} responded with #{res.code} but does not seem to be Jenkins") if res.code != 404
|
||||
return
|
||||
end
|
||||
else
|
||||
vprint_error("No reponse recieved from #{rhost}:#{rport}")
|
||||
return
|
||||
end
|
||||
version = res.headers['X-Jenkins']
|
||||
vprint_status("#{rhost}:#{rport} Jenkins Version - #{version}")
|
||||
# script - exploit module for this
|
||||
# view/All/newJob - can be exploited manually
|
||||
# asynchPeople - Jenkins users
|
||||
# systemInfo - system information
|
||||
apps = [ 'script',
|
||||
'view/All/newJob',
|
||||
'asynchPeople/',
|
||||
'systemInfo',
|
||||
]
|
||||
apps.each do |app|
|
||||
check_app(app)
|
||||
end
|
||||
end
|
||||
def run_host(ip)
|
||||
res = send_request_cgi(
|
||||
{
|
||||
'uri' => target_uri.path,
|
||||
'method' => 'GET',
|
||||
'ctype' => 'text/plain',
|
||||
})
|
||||
if res
|
||||
# check to see if we are dealing with a Jenkins installation
|
||||
if not res.headers.include?('X-Jenkins')
|
||||
print_status("#{rhost}:#{rport} responded with #{res.code} but does not seem to be Jenkins") if res.code != 404
|
||||
return
|
||||
end
|
||||
else
|
||||
vprint_error("No reponse recieved from #{rhost}:#{rport}")
|
||||
return
|
||||
end
|
||||
version = res.headers['X-Jenkins']
|
||||
vprint_status("#{rhost}:#{rport} Jenkins Version - #{version}")
|
||||
# script - exploit module for this
|
||||
# view/All/newJob - can be exploited manually
|
||||
# asynchPeople - Jenkins users
|
||||
# systemInfo - system information
|
||||
apps = [ 'script',
|
||||
'view/All/newJob',
|
||||
'asynchPeople/',
|
||||
'systemInfo',
|
||||
]
|
||||
apps.each do |app|
|
||||
check_app(app)
|
||||
end
|
||||
end
|
||||
|
||||
def check_app(app)
|
||||
uri_path = normalize_uri(target_uri.path, app)
|
||||
res = send_request_cgi({
|
||||
'uri' => uri_path,
|
||||
'method' => 'GET',
|
||||
'ctype' => 'text/plain',
|
||||
})
|
||||
if not res
|
||||
vprint_error("Failed to connect to #{rhost}:#{rport}#{uri_path}")
|
||||
return
|
||||
end
|
||||
case res.code
|
||||
when 200
|
||||
print_good("#{rhost}:#{rport}#{uri_path} does not require authentication (200)")
|
||||
case app
|
||||
when "systemInfo"
|
||||
parse_system_info(res.body)
|
||||
when "script"
|
||||
report_vuln(
|
||||
:host => rhost,
|
||||
:port => rport,
|
||||
:proto => 'tcp',
|
||||
:sname => (ssl ? 'https' : 'http'),
|
||||
:name => self.name,
|
||||
:info => "Module #{self.fullname} confirmed access to the Jenkins Script Console with no authentication"
|
||||
)
|
||||
end
|
||||
when 403
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} restricted (403)")
|
||||
when 401
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} requires authentication (401): #{res.headers['WWW-Authenticate']}")
|
||||
when 404
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} not found (404)")
|
||||
when 301
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
|
||||
when 302
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
|
||||
else
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} Don't know how to handle response code #{res.code}")
|
||||
end
|
||||
end
|
||||
def check_app(app)
|
||||
uri_path = normalize_uri(target_uri.path, app)
|
||||
res = send_request_cgi({
|
||||
'uri' => uri_path,
|
||||
'method' => 'GET',
|
||||
'ctype' => 'text/plain',
|
||||
})
|
||||
if not res
|
||||
vprint_error("Failed to connect to #{rhost}:#{rport}#{uri_path}")
|
||||
return
|
||||
end
|
||||
case res.code
|
||||
when 200
|
||||
print_good("#{rhost}:#{rport}#{uri_path} does not require authentication (200)")
|
||||
case app
|
||||
when "systemInfo"
|
||||
parse_system_info(res.body)
|
||||
when "script"
|
||||
report_vuln(
|
||||
:host => rhost,
|
||||
:port => rport,
|
||||
:proto => 'tcp',
|
||||
:sname => (ssl ? 'https' : 'http'),
|
||||
:name => self.name,
|
||||
:info => "Module #{self.fullname} confirmed access to the Jenkins Script Console with no authentication"
|
||||
)
|
||||
end
|
||||
when 403
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} restricted (403)")
|
||||
when 401
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} requires authentication (401): #{res.headers['WWW-Authenticate']}")
|
||||
when 404
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} not found (404)")
|
||||
when 301
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
|
||||
when 302
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} is redirected (#{res.code}) to #{res.headers['Location']} (not following)")
|
||||
else
|
||||
vprint_status("#{rhost}:#{rport}#{uri_path} Don't know how to handle response code #{res.code}")
|
||||
end
|
||||
end
|
||||
|
||||
def parse_system_info(body)
|
||||
vprint_status("#{rhost}:#{rport} getting useful information from systemInfo")
|
||||
infos = {
|
||||
"os.name" => nil,
|
||||
"os.version" => nil,
|
||||
"sun.os.patch.level" => nil,
|
||||
"os.arch" => nil,
|
||||
"user.name" => nil,
|
||||
"USERDOMAIN" => nil,
|
||||
"user.home" => nil,
|
||||
"user.language" => nil,
|
||||
"user.country" => nil,
|
||||
"user.timezone" => nil,
|
||||
"COMPUTERNAME" => nil,
|
||||
"SystemDrive" => nil,
|
||||
"TEMP" => nil,
|
||||
"TMP" => nil,
|
||||
"SHELL" => nil
|
||||
}
|
||||
# remove unclosed tags for REXML
|
||||
body = body.gsub('<wbr>', '')
|
||||
body = body.gsub('<br>', '')
|
||||
doc = REXML::Document.new(body)
|
||||
tds = doc.get_elements("//td")
|
||||
tdcounter = 0
|
||||
tds.each do |td|
|
||||
td = td.get_text.to_s.strip
|
||||
infos.each do |k, v|
|
||||
if td == k
|
||||
infos[k] = tds[tdcounter +1].get_text.to_s.strip
|
||||
end
|
||||
end
|
||||
tdcounter +=1
|
||||
end
|
||||
def parse_system_info(body)
|
||||
vprint_status("#{rhost}:#{rport} getting useful information from systemInfo")
|
||||
infos = {
|
||||
"os.name" => nil,
|
||||
"os.version" => nil,
|
||||
"sun.os.patch.level" => nil,
|
||||
"os.arch" => nil,
|
||||
"user.name" => nil,
|
||||
"USERDOMAIN" => nil,
|
||||
"user.home" => nil,
|
||||
"user.language" => nil,
|
||||
"user.country" => nil,
|
||||
"user.timezone" => nil,
|
||||
"COMPUTERNAME" => nil,
|
||||
"SystemDrive" => nil,
|
||||
"TEMP" => nil,
|
||||
"TMP" => nil,
|
||||
"SHELL" => nil
|
||||
}
|
||||
# remove unclosed tags for REXML
|
||||
body = body.gsub('<wbr>', '')
|
||||
body = body.gsub('<br>', '')
|
||||
doc = REXML::Document.new(body)
|
||||
tds = doc.get_elements("//td")
|
||||
tdcounter = 0
|
||||
tds.each do |td|
|
||||
td = td.get_text.to_s.strip
|
||||
infos.each do |k, v|
|
||||
if td == k
|
||||
infos[k] = tds[tdcounter +1].get_text.to_s.strip
|
||||
end
|
||||
end
|
||||
tdcounter +=1
|
||||
end
|
||||
|
||||
# print out the goodies
|
||||
infos.each do |k, v|
|
||||
next if v.nil?
|
||||
case k
|
||||
when "os.name"
|
||||
print_line(" OS: #{v}")
|
||||
when "os.version"
|
||||
print_line(" OS Version: #{v}")
|
||||
when "sun.os.patch.level"
|
||||
print_line(" Patch Level: #{v}")
|
||||
when "os.arch"
|
||||
print_line(" Arch: #{v}")
|
||||
when "user.name"
|
||||
print_line(" User: #{v}")
|
||||
when "USERDOMAIN"
|
||||
print_line(" Domain: #{v}")
|
||||
when "COMPUTERNAME"
|
||||
print_line(" Computer Name: #{v}")
|
||||
when "SystemDrive"
|
||||
vprint_line(" System Drive: #{v}")
|
||||
when "SHELL"
|
||||
print_line(" Shell: #{v}")
|
||||
when "TEMP"
|
||||
print_line(" Temp Directory: #{v}")
|
||||
when "TMP"
|
||||
print_line(" Temp Directory: #{v}") if infos["TEMP"].nil?
|
||||
when "user.home"
|
||||
vprint_line(" Home Directory: #{v}")
|
||||
when "user.language"
|
||||
vprint_line(" Language: #{v}")
|
||||
when "user.country"
|
||||
vprint_line(" Country: #{v}")
|
||||
when "user.timezone"
|
||||
vprint_line(" Timezone: #{v}")
|
||||
end
|
||||
# print out the goodies
|
||||
infos.each do |k, v|
|
||||
next if v.nil?
|
||||
case k
|
||||
when "os.name"
|
||||
print_line(" OS: #{v}")
|
||||
when "os.version"
|
||||
print_line(" OS Version: #{v}")
|
||||
when "sun.os.patch.level"
|
||||
print_line(" Patch Level: #{v}")
|
||||
when "os.arch"
|
||||
print_line(" Arch: #{v}")
|
||||
when "user.name"
|
||||
print_line(" User: #{v}")
|
||||
when "USERDOMAIN"
|
||||
print_line(" Domain: #{v}")
|
||||
when "COMPUTERNAME"
|
||||
print_line(" Computer Name: #{v}")
|
||||
when "SystemDrive"
|
||||
vprint_line(" System Drive: #{v}")
|
||||
when "SHELL"
|
||||
print_line(" Shell: #{v}")
|
||||
when "TEMP"
|
||||
print_line(" Temp Directory: #{v}")
|
||||
when "TMP"
|
||||
print_line(" Temp Directory: #{v}") if infos["TEMP"].nil?
|
||||
when "user.home"
|
||||
vprint_line(" Home Directory: #{v}")
|
||||
when "user.language"
|
||||
vprint_line(" Language: #{v}")
|
||||
when "user.country"
|
||||
vprint_line(" Country: #{v}")
|
||||
when "user.timezone"
|
||||
vprint_line(" Timezone: #{v}")
|
||||
end
|
||||
|
||||
end
|
||||
print_line('')
|
||||
end
|
||||
end
|
||||
print_line('')
|
||||
end
|
||||
end
|
||||
|
|
Loading…
Reference in New Issue