rapid7/metasploit-framework

View on GitHub
lib/metasploit/framework/login_scanner/directadmin.rb

Summary

Maintainability
A
2 hrs
Test Coverage
require 'metasploit/framework/login_scanner/http'

module Metasploit
  module Framework
    module LoginScanner

      class DirectAdmin < HTTP

        DEFAULT_PORT  = 443
        PRIVATE_TYPES = [ :password ]


        # Checks if the target is Direct Admin Web Control Panel. The login module should call this.
        #
        # @return [Boolean] TrueClass if target is DAWCP, otherwise FalseClass
        def check_setup
          login_uri = normalize_uri("#{uri}/CMD_LOGIN")
          res = send_request({'uri'=> login_uri})

          if res && res.body.include?('DirectAdmin Login')
            return true
          end

          false
        end


        # Returns the latest sid from DirectAdmin Control Panel
        #
        # @return [String] The PHP Session ID for DirectAdmin Web Control login
        def get_last_sid
          @last_sid ||= lambda {
            # We don't have a session ID. Well, let's grab one right quick from the login page.
            # This should probably only happen once (initially).
            login_uri = normalize_uri("#{uri}/CMD_LOGIN")
            res = send_request({'uri' => login_uri})

            return '' unless res

            cookies = res.get_cookies
            @last_sid = cookies.scan(/(session=\w+);*/).flatten[0] || ''
          }.call
        end


        # Actually doing the login. Called by #attempt_login
        #
        # @param username [String] The username to try
        # @param password [String] The password to try
        # @return [Hash]
        #   * :status [Metasploit::Model::Login::Status]
        #   * :proof [String] the HTTP response body
        def get_login_state(username, password)
          # Prep the data needed for login
          sid       = get_last_sid
          protocol  = ssl ? 'https' : 'http'
          peer      = "#{host}:#{port}"
          login_uri = normalize_uri("#{uri}/CMD_LOGIN")

          res = send_request({
            'uri' => login_uri,
            'method' => 'POST',
            'cookie' => sid,
            'headers' => {
              'Referer' => "#{protocol}://#{peer}/#{login_uri}"
            },
            'vars_post' => {
              'username' => username,
              'password' => password,
              'referer' => '%2F'
            }
          })

          unless res
            return {:status => Metasploit::Model::Login::Status::UNABLE_TO_CONNECT, :proof => res.to_s}
          end

          # After login, the application should give us a new SID
          cookies = res.get_cookies
          sid = cookies.scan(/(session=\w+);*/).flatten[0] || ''
          @last_sid = sid # Update our SID

          if res.headers['Location'].to_s.include?('/') && !sid.blank?
            return {:status => Metasploit::Model::Login::Status::SUCCESSFUL, :proof => res.to_s}
          end

          {:status => Metasploit::Model::Login::Status::INCORRECT, :proof => res.to_s}
        end


        # Attempts to login to DirectAdmin Web Control Panel. This is called first.
        #
        # @param credential [Metasploit::Framework::Credential] The credential object
        # @return [Result] A Result object indicating success or failure
        def attempt_login(credential)
          result_opts = {
            credential: credential,
            status: Metasploit::Model::Login::Status::INCORRECT,
            proof: nil,
            host: host,
            port: port,
            protocol: 'tcp',
            service_name: ssl ? 'https' : 'http'
          }

          begin
            result_opts.merge!(get_login_state(credential.public, credential.private))
          rescue ::Rex::ConnectionError => e
            # Something went wrong during login. 'e' knows what's up.
            result_opts.merge!(status: Metasploit::Model::Login::Status::UNABLE_TO_CONNECT, proof: e.message)
          end

          Result.new(result_opts)
        end

      end
    end
  end
end