-
Notifications
You must be signed in to change notification settings - Fork 13.9k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add generic JCL cmd payload for z/OS (mainframe)
This payload does nothing but return successfully. It can be used to test exploits and as a basis for other JCL cmd payloads.
- Loading branch information
1 parent
72bde63
commit a6518b5
Showing
2 changed files
with
75 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
## | ||
# This is a prototype JCL command payload for z/OS - mainframe. | ||
# It submits the IEFBR14 standard z/OS program, which does nothing | ||
# but complete successfully and return code 0. | ||
# | ||
# See http://www.ibm.com/support/knowledgecenter/SSLTBW_2.1.0/com.ibm.zos.v2r1.ieab500/hpropr.htm?lang=en | ||
# for more information on IEFBR14 | ||
## | ||
|
||
|
||
require 'msf/core' | ||
require 'msf/core/handler/find_shell' | ||
require 'msf/base/sessions/mainframe_shell' | ||
require 'msf/base/sessions/command_shell_options' | ||
|
||
module MetasploitModule | ||
|
||
CachedSize = :dynamic | ||
|
||
include Msf::Payload::Single | ||
include Msf::Payload::Mainframe | ||
include Msf::Sessions::CommandShellOptions | ||
|
||
def initialize(info = {}) | ||
super(merge_info(info, | ||
'Name' => 'Generic JCL Test for Mainframe Exploits', | ||
'Description' => 'Provide JCL which can be used to submit | ||
a job to JES2 on z/OS which will exit and return 0. This | ||
can be used as a template for other JCL based payloads', | ||
'Author' => 'Bigendian Smalls', | ||
'License' => MSF_LICENSE, | ||
'Platform' => 'mainframe', | ||
'Arch' => ARCH_CMD, | ||
'Handler' => Msf::Handler::None, | ||
'Session' => Msf::Sessions::MainframeShell, | ||
'PayloadType' => 'cmd', | ||
'RequiredCmd' => 'jcl', | ||
'Payload' => | ||
{ | ||
'Offsets' => { }, | ||
'Payload' => '' | ||
} | ||
)) | ||
end | ||
|
||
## | ||
# Construct the paload | ||
## | ||
def generate | ||
return super + command_string | ||
end | ||
|
||
## | ||
# Build the command string for JCL submission | ||
## | ||
def command_string | ||
return "//DUMMY JOB (MFUSER),'dummy job',\n" + | ||
"// NOTIFY=&SYSUID,\n" + | ||
"// MSGCLASS=H,\n" + | ||
"// MSGLEVEL=(1,1),\n" + | ||
"// REGION=0M\n" + | ||
"// EXEC PGM=IEFBR14\n" | ||
end | ||
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters