73 lines
1.5 KiB
Ruby
73 lines
1.5 KiB
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# Framework web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/framework/
|
|
##
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Auxiliary
|
|
|
|
include Msf::Exploit::Remote::Tcp
|
|
include Msf::Auxiliary::Scanner
|
|
include Msf::Auxiliary::Report
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'MySQL Server Version Enumeration',
|
|
'Description' => %q{
|
|
Enumerates the version of MySQL servers
|
|
},
|
|
'Version' => '$Revision$',
|
|
'Author' => 'kris katterjohn',
|
|
'License' => MSF_LICENSE
|
|
)
|
|
|
|
register_options([
|
|
Opt::RPORT(3306)
|
|
])
|
|
end
|
|
|
|
# Based on my mysql-info NSE script
|
|
def run_host(ip)
|
|
begin
|
|
s = connect(false)
|
|
data = s.get
|
|
disconnect(s)
|
|
rescue ::Rex::ConnectionError, ::EOFError
|
|
return
|
|
rescue ::Exception
|
|
print_error("Error: #{$!}")
|
|
return
|
|
end
|
|
|
|
offset = 0
|
|
|
|
l0, l1, l2 = data[offset, 3].unpack('CCC')
|
|
length = l0 | (l1 << 8) | (l2 << 16)
|
|
|
|
# Read a bad amount of data
|
|
return if length != (data.length - 4)
|
|
|
|
offset += 4
|
|
|
|
proto = data[offset, 1].unpack('C')[0]
|
|
|
|
# Error condition
|
|
return if proto == 255
|
|
|
|
offset += 1
|
|
|
|
version = data[offset..-1].unpack('Z*')[0]
|
|
|
|
print_status("#{rhost}:#{rport} is running MySQL #{version} (protocol #{proto})")
|
|
report_service(:host => rhost, :port => rport, :name => "mysql", :info => version)
|
|
end
|
|
end
|
|
|