Vulnonym.com

CVE-2015-3224 - Dottier Emitter

Description

request.rb in Web Console before 2.1.3 as used with Ruby on Rails 3.x and 4.x does not properly restrict the use of X-Forwarded-For headers in determining a client’s IP address which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.

Reference

https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ http://openwall.com/lists/oss-security/2015/06/16/18 https://github.com/rails/web-console/blob/master/CHANGELOG.markdown http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html http://www.securityfocus.com/bid/75237

Exploit

CVE-2015-3224

Ruby-On-Rails Web Console RCE

What is this?

This is a metasploit module for Metasploit.

I already have this module.

Yes, this is packaged into metasploit. But with that module you can’t get arbitrary command execution.

I mean, you can only establish reverse/bind shell payloads with it. I needed to execute commands right to the shell. So I modified the metasploit module in a manner that it is now able to execute single commands into the system.

Good. How do I use it?

To install this module you can run the automatic installation script I developed to install it quickly to your metasploit.

./install.sh

Then the exploit will be into your metasploit framework! Just search for it using “search ruby-on-rails” or “search cve-2015-3224”

Screenshot

Module

Author Rights

I got no rights to this CVE neither to the metasploit module itself. This is just a hack I’ve done it so it can fit into my needs and may be just what you have been looking for.