rapid7/metasploit-framework

View on GitHub
modules/auxiliary/scanner/http/webdav_scanner.rb

Summary

Maintainability
A
3 hrs
Test Coverage
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary

  # Exploit mixins should be called first
  include Msf::Exploit::Remote::HttpClient
  include Msf::Auxiliary::WmapScanServer
  # Scanner mixin should be near last
  include Msf::Auxiliary::Scanner
  include Msf::Auxiliary::Report

  def initialize
    super(
      'Name'        => 'HTTP WebDAV Scanner',
      'Description' => 'Detect webservers with WebDAV enabled',
      'Author'       => ['et'],
      'License'     => MSF_LICENSE
    )

    register_options(
      [
        OptString.new('PATH', [true, "Path to use", '/']),
      ])
  end

  def run_host(target_host)

    begin
      res = send_request_raw({
        'uri'          => normalize_uri(datastore['PATH']),
        'method'       => 'OPTIONS'
      }, 10)

      if res and res.code == 200
        http_fingerprint({ :response => res })

        tserver = res.headers['Server']
        tdav = res.headers['DAV'].to_s

        if (tdav == '1, 2' or tdav[0,3] == '1,2')
          wdtype = 'WEBDAV'
          if res.headers['X-MSDAVEXT']
            wdtype = 'SHAREPOINT DAV'
          end

          print_good("#{target_host} (#{tserver}) has #{wdtype} ENABLED")

          report_note(
            {
              :host   => target_host,
              :proto  => 'tcp',
              :sname => (ssl ? 'https' : 'http'),
              :port   => rport,
              :type   => wdtype,
              :data   => datastore['PATH']
            })

        else
          print_status("#{target_host} (#{tserver}) WebDAV disabled.")
        end
      end

    rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout
    rescue ::Timeout::Error, ::Errno::EPIPE
    end
  end
end