rapid7/metasploit-framework

View on GitHub
lib/metasploit/framework/login_scanner/redis.rb

Summary

Maintainability
A
2 hrs
Test Coverage
require 'metasploit/framework/login_scanner/base'
require 'metasploit/framework/login_scanner/rex_socket'
require 'metasploit/framework/tcp/client'

module Metasploit
  module Framework
    module LoginScanner

      # This is the LoginScanner class for dealing with REDIS.
      # It is responsible for taking a single target, and a list of credentials
      # and attempting them. It then saves the results.

      class Redis
        include Metasploit::Framework::LoginScanner::Base
        include Metasploit::Framework::LoginScanner::RexSocket
        include Metasploit::Framework::Tcp::Client

        DEFAULT_PORT         = 6379
        LIKELY_PORTS         = [ DEFAULT_PORT ]
        LIKELY_SERVICE_NAMES = [ 'redis' ]
        PRIVATE_TYPES        = [ :password ]
        REALM_KEY            = nil

        # This method can create redis command which can be read by redis server
        def redis_proto(command_parts)
          return if command_parts.blank?
          command = "*#{command_parts.length}\r\n"
          command_parts.each do |p|
            command << "$#{p.length}\r\n#{p}\r\n"
          end
          command
        end

        # This method attempts a single login with a single credential against the target
        # @param credential [Credential] The credential object to attempt to login with
        # @return [Metasploit::Framework::LoginScanner::Result] The LoginScanner Result object
        def attempt_login(credential)
          result_options = {
            credential: credential,
            status: Metasploit::Model::Login::Status::INCORRECT,
            host: host,
            port: port,
            protocol: 'tcp',
            service_name: 'redis'
          }

          disconnect if self.sock

          begin
            connect
            select([sock], nil, nil, 0.4)

            command = redis_proto(['AUTH', "#{credential.private}"])
            sock.put(command)
            result_options[:proof] = sock.get_once

            # No password      - ( -ERR Client sent AUTH, but no password is set\r\n )
            # Invalid password - ( -ERR invalid password\r\n )
            # Valid password   - (+OK\r\n)

            if result_options[:proof] && result_options[:proof] =~ /but no password is set/i
              result_options[:status] = Metasploit::Model::Login::Status::NO_AUTH_REQUIRED
            elsif result_options[:proof] && result_options[:proof] =~ /^-ERR invalid password/i
              result_options[:status] = Metasploit::Model::Login::Status::INCORRECT
            elsif result_options[:proof] && result_options[:proof][/^\+OK/]
              result_options[:status] = Metasploit::Model::Login::Status::SUCCESSFUL
            end

          rescue Rex::ConnectionError, EOFError, Timeout::Error, Errno::EPIPE => e
            result_options.merge!(
              proof: e,
              status: Metasploit::Model::Login::Status::UNABLE_TO_CONNECT
            )
          end
          disconnect if self.sock
          ::Metasploit::Framework::LoginScanner::Result.new(result_options)
        end

        private

        # (see Base#set_sane_defaults)
        def set_sane_defaults
          self.connection_timeout  ||= 30
          self.port                ||= DEFAULT_PORT
          self.max_send_size       ||= 0
          self.send_delay          ||= 0
        end
      end
    end
  end
end