-
Notifications
You must be signed in to change notification settings - Fork 14.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Apply escaping args to other command shells #19745
Open
smashery
wants to merge
2
commits into
rapid7:master
Choose a base branch
from
smashery:escape_arg_fix
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from 1 commit
Commits
Show all changes
2 commits
Select commit
Hold shift + click to select a range
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
module Msf::Sessions | ||
module UnixEscaping | ||
def shell_command_token(cmd,timeout = 10) | ||
shell_command_token_unix(cmd,timeout) | ||
end | ||
|
||
# Convert the executable and argument array to a command that can be run in this command shell | ||
# @param cmd_and_args [Array<String>] The process path and the arguments to the process | ||
def to_cmd(cmd_and_args) | ||
escaped = cmd_and_args.map do |arg| | ||
escape_arg(arg) | ||
end | ||
smashery marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
escaped.join(' ') | ||
end | ||
|
||
# Escape an individual argument per Unix shell rules | ||
# @param arg [String] Shell argument | ||
def escape_arg(arg) | ||
quote_requiring = ['\\', '`', '(', ')', '<', '>', '&', '|', ' ', '@', '"', '$', ';'] | ||
result = CommandShell._glue_cmdline_escape(arg, quote_requiring, "'", "\\'", "'") | ||
if result == '' | ||
result = "''" | ||
end | ||
|
||
result | ||
end | ||
end | ||
end |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change | ||||
---|---|---|---|---|---|---|
@@ -0,0 +1,106 @@ | ||||||
module Msf::Sessions | ||||||
module WindowsEscaping | ||||||
def space_chars | ||||||
[' ', '\t', '\v'] | ||||||
end | ||||||
|
||||||
def shell_command_token(cmd,timeout = 10) | ||||||
shell_command_token_win32(cmd,timeout) | ||||||
end | ||||||
|
||||||
# Escape a process for the command line | ||||||
# @param executable [String] The process to launch | ||||||
def escape_cmd(executable) | ||||||
needs_quoting = space_chars.any? do |char| | ||||||
executable.include?(char) | ||||||
end | ||||||
|
||||||
if needs_quoting | ||||||
executable = "\"#{executable}\"" | ||||||
end | ||||||
|
||||||
executable | ||||||
end | ||||||
|
||||||
# Convert the executable and argument array to a commandline that can be passed to CreateProcessAsUserW. | ||||||
# @param args [Array<String>] The arguments to the process | ||||||
# @remark The difference between this and `to_cmd` is that the output of `to_cmd` is expected to be passed | ||||||
# to cmd.exe, whereas this is expected to be passed directly to the Win32 API, anticipating that it | ||||||
# will in turn be interpreted by CommandLineToArgvW. | ||||||
def argv_to_commandline(args) | ||||||
escaped_args = args.map do |arg| | ||||||
escape_arg(arg) | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. More condensed form
Suggested change
|
||||||
end | ||||||
|
||||||
escaped_args.join(' ') | ||||||
end | ||||||
|
||||||
# Escape an individual argument per Windows shell rules | ||||||
# @param arg [String] Shell argument | ||||||
def escape_arg(arg) | ||||||
needs_quoting = space_chars.any? do |char| | ||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. More condensed form
Suggested change
|
||||||
arg.include?(char) | ||||||
end | ||||||
|
||||||
# Fix the weird behaviour when backslashes are treated differently when immediately prior to a double-quote | ||||||
# We need to send double the number of backslashes to make it work as expected | ||||||
# See: https://learn.microsoft.com/en-us/windows/win32/api/shellapi/nf-shellapi-commandlinetoargvw#remarks | ||||||
arg = arg.gsub(/(\\*)"/, '\\1\\1"') | ||||||
|
||||||
# Quotes need to be escaped | ||||||
arg = arg.gsub('"', '\\"') | ||||||
|
||||||
if needs_quoting | ||||||
# At the end of the argument, we're about to add another quote - so any backslashes need to be doubled here too | ||||||
arg = arg.gsub(/(\\*)$/, '\\1\\1') | ||||||
arg = "\"#{arg}\"" | ||||||
end | ||||||
|
||||||
# Empty string needs to be coerced to have a value | ||||||
arg = '""' if arg == '' | ||||||
|
||||||
arg | ||||||
end | ||||||
|
||||||
# Convert the executable and argument array to a command that can be run in this command shell | ||||||
# @param cmd_and_args [Array<String>] The process path and the arguments to the process | ||||||
def to_cmd(cmd_and_args) | ||||||
# The space, caret and quote chars need to be inside double-quoted strings. | ||||||
# The percent character needs to be escaped using a caret char, while being outside a double-quoted string. | ||||||
# | ||||||
# Situations where these two situations combine are going to be the trickiest cases: something that has quote-requiring | ||||||
# characters (e.g. spaces), but which also needs to avoid expanding an environment variable. In this case, | ||||||
# the string needs to end up being partially quoted; with parts of the string in quotes, but others (i.e. bits with percents) not. | ||||||
# For example: | ||||||
# 'env var is %temp%, yes, %TEMP%' needs to end up as '"env var is "^%temp^%", yes, "^%TEMP^%' | ||||||
# | ||||||
# There is flexibility in how you might implement this, but I think this one looks the most "human" to me, | ||||||
# which would make it less signaturable. | ||||||
# | ||||||
# To do this, we'll consider each argument character-by-character. Each time we encounter a percent sign, we break out of any quotes | ||||||
# (if we've been inside them in the current "token"), and then start a new "token". | ||||||
|
||||||
quote_requiring = ['"', '^', ' ', "\t", "\v", '&', '<', '>', '|'] | ||||||
|
||||||
escaped_cmd_and_args = cmd_and_args.map do |arg| | ||||||
# Escape quote chars by doubling them up, except those preceeded by a backslash (which are already effectively escaped, and handled below) | ||||||
arg = arg.gsub(/([^\\])"/, '\\1""') | ||||||
arg = arg.gsub(/^"/, '""') | ||||||
|
||||||
result = CommandShell._glue_cmdline_escape(arg, quote_requiring, '%', '^%', '"') | ||||||
|
||||||
# Fix the weird behaviour when backslashes are treated differently when immediately prior to a double-quote | ||||||
# We need to send double the number of backslashes to make it work as expected | ||||||
# See: https://learn.microsoft.com/en-us/windows/win32/api/shellapi/nf-shellapi-commandlinetoargvw#remarks | ||||||
result.gsub!(/(\\*)"/, '\\1\\1"') | ||||||
|
||||||
# Empty string needs to be coerced to have a value | ||||||
result = '""' if result == '' | ||||||
|
||||||
result | ||||||
end | ||||||
|
||||||
escaped_cmd_and_args.join(' ') | ||||||
end | ||||||
end | ||||||
end |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you sure there are no other possibilities besides Windows and Unix wrt. shell escaping?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From https://github.com/rapid7/metasploit-framework/blob/master/lib/metasploit/framework/ssh/platform.rb#L97-L132, I'm really not all that familiar with what exactly to expect shell-escaping-wise when you get (for example) an "arista" shell. If it's some custom shell completely unrelated to anything POSIX, then any of the behaviour that uses
escape_arg
(such as uploading files or launching processes) would be useless anyway and would need its entirely new implementation.In those cases, I'm not sure what the best default would be. The alternative I guess would be better in those unknown cases to just not extend the object, and do no escaping.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From my very brief analysis, the current state should easily cover all platforms except Cisco ios, Juniper, Mikrotik, Arista and vcenter - I'm not 100% sure how those shells work when it comes to character escaping. So the options are: add
else
for all above mentioned and just implement escaping for them later on with more thorough analysis or ignore it, hope for best and add at leastelse
block for Unknown platform. We will probably have to create/extend tests for SSH sessions (though I'm not very familiar how they are implemented now, but I don't expect such cases are covered there).