rapid7/metasploit-framework

View on GitHub
lib/metasploit/framework/varnish/client.rb

Summary

Maintainability
A
35 mins
Test Coverage
# -*- coding: binary -*-
module Metasploit
  module Framework
    module Varnish
      module Client

        @@AUTH_REQUIRED_REGEX = /107 \d+\s\s\s\s\s\s\n(\w+)\n\nAuthentication required\./ # 107 auth
        @@AUTH_SUCCESS_REGEX = /200 \d+/ # 200 ok

        def require_auth?
          # function returns false if no auth is required, else the challenge string
          res = sock.get_once # varnish can give the challenge on connect, so check if we have it already
          if res && res =~ @@AUTH_REQUIRED_REGEX
            return $1
          end
          # Cause a login fail to get the challenge. Length is correct, but this has upper chars, subtle diff for debugging
          sock.put("auth #{Rex::Text.rand_text_alphanumeric(64)}\n")
          res = sock.get_once # grab challenge
          if res && res =~ @@AUTH_REQUIRED_REGEX
            return $1
          end
          return false
        end

        def login(pass)
          # based on https://www.varnish-cache.org/trac/wiki/CLI
          begin
            challenge = require_auth?
            if !!challenge
              response = Digest::SHA256.hexdigest("#{challenge}\n#{pass.strip}\n#{challenge}\n")
              sock.put("auth #{response}\n")
              res = sock.get_once
              if res && res =~ @@AUTH_SUCCESS_REGEX
                return true
              else
                return false
              end
            else
              raise RuntimeError, "No Auth Required"
            end
          rescue Timeout::Error
            raise RuntimeError, "Varnish Login timeout"
          end
        end

        def close_session
          sock.put('quit')
        end

      end
    end
  end
end